Subject: Re: CVS commit: syssrc/sys/dev/ic
To: gabriel rosenkoetter <firstname.lastname@example.org>
From: Michael Graff <email@example.com>
Date: 11/09/2001 16:21:54
gabriel rosenkoetter <firstname.lastname@example.org> writes:
> Michael Graff's situation, on a fully private network, is different,
> provided he trusts everyone who uses that network. Are we wrong to
> presume that his situation is the exception rather than the norm?
I know it's the exception. :)
One more point to make. It seems that, from a mostly layman's point
of view, that stirring a pool where an outside attacker knows nothing
or extremely little of the internal state isn't a bad thing to do.
I tend to run all my network interfaces with the "stir in the entropy,
but don't estimate how much was collected" mode.
I really think putting stronger language in the man page is the right