看板FB_security
標 題Re: Speed and security of /dev/urandom
發信站NCTU CS FreeBSD Server (Sat Jul 19 05:53:01 2014)
轉信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
On 18/07/14 21:37, Andrey Chernov wrote:
> One of the reason I hear is that true random entropy bits can be quickly
> exhausted if every userland program will drain them so much.
True of Linux at least, I assume that's why they must make /dev/random
block when the estimated entropy in the pool is low. Applications have
been encouraged to not excessively read even from /dev/urandom, for the
same reason, so it makes sense on Linux to stretch with RC4 or something.
Regards,
--
Steven Chamberlain
[email protected]
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"