lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 20 Aug 2012 11:29:41 -0500
From: Paul Schmehl <>
To: Dan Kaminsky <>, Paul Schmehl <>
Subject: Re: DakaRand

--On August 20, 2012 8:32:59 AM -0700 Dan Kaminsky <> wrote:

> On Mon, Aug 20, 2012 at 8:29 AM, Paul Schmehl <>
> wrote:
> --On August 20, 2012 2:22:28 AM -0700 Dan Kaminsky <>
> wrote:
> May I ask what FreeBSD's entropy sources are?
> I'm surprised you don't already know.  From device noise.
> Which class?  There are many sorts of said noise (most of which I
> believe actually work).

The long answer is look at /usr/src/sys/sys/random.h.

The short answer is:
/* Allow the sysadmin to select the broad category of
 * entropy types to harvest
struct harvest_select {
	int ethernet;
	int point_to_point;
	int interrupt;
	int swi;

swi is software interrupt handlers.  interrupt is hardware interrupts (e.g. 
usb, pci, etc.)

*If* you install a hardware PRNG, FreeBSD will use that instead (by 

Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
"It is as useless to argue with those who have
renounced the use of reason as to administer
medication to the dead." Thomas Jefferson
"There are some ideas so wrong that only a very
intelligent person could believe in them." George Orwell

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists