> I guess it follows that it is not a good idea to generate keys or
> certificates on -CURRENT for a while (until entropy comes back to town)?
Correct if they rely on /dev/random for entropy.
> I don't know which applications depend on /dev/random providing entropy
> and which gather their own.
Right.
> If so, I think this needs an UPDATING entry, particularly since the
> symptoms could outlive the cause. i.e. something to the effect of
> ``Keys and certificates generated on -CURRENT on or after m/d/y should
> not be used'' and updated again when the entropy is again available.
Agreed.
M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message