看板FB_security
標 題Re: Speed and security of /dev/urandom
發信站NCTU CS FreeBSD Server (Sat Jul 19 08:37:17 2014)
轉信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
On 18.07.2014 3:41, Steven Chamberlain wrote:
> Is there a good reason arc4random_buf() can't take bytes directly from
> /dev/urandom or sysctl KERN_ARND? Therefore no longer needing to seed
> first, periodically reseed, or use any stream cipher?
One of the reason I hear is that true random entropy bits can be quickly
exhausted if every userland program will drain them so much.
--
http://ache.vniz.net/
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"