-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 24 Nov 2008 20:08:59 +0200
Aragon Gouveia <[EMAIL PROTECTED]> mentioned:

> | By FreeBSD Security Advisories <[EMAIL PROTECTED]>
> |                                          [ 2008-11-24 19:48 +0200 ]
> > III. Impact
> > 
> > All security-related kernel subsystems that rely on a quality random
> > number generator are subject to a wide range of possible attacks for the
> > 300 seconds after boot or until 64k of random data is consumed.  The list
> > includes:
> 
> I suppose this would affect the quality of SSH host keys generated at boot
> time by RC?
> 

Nope, userland is unaffected.

- -- 
Stanislav Sedov
ST4096-RIPE
-----BEGIN PGP SIGNATURE-----

iEUEARECAAYFAkkrI3gACgkQK/VZk+smlYFwWQCXSwYxHbUizxmriBT3pO1Ei8W7
GACff74X/J3b4c01zRkXmsYxE981hwk=
=v+Xl
-----END PGP SIGNATURE-----
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to