Tim Kientzle wrote:
> The obvious fix would alter dhclient to rely only
> on /dev/random for entropy.  (It seems this code is
> common to bind as well.)

The "obvious fix", I think, is to just use the boot time as
the start for the exponential backoff.  The only place this
might be a problem is in a big installation where a lot of
machines come on at the same time.  That's probably going to
melt your building's wiring, anyway.  8-).


> Technical Question: is /dev/random sufficient
> for the cryptographic requirements of programs
> like dhclient, bind, etc?

Uh, what "cryptographic requirements" of dhclient?


-- Terry

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to