[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <475EE920.7000108@cfl.rr.com>
Date: Tue, 11 Dec 2007 14:46:40 -0500
From: Phillip Susi <psusi@....rr.com>
To: Theodore Tso <tytso@....edu>, Matt Mackall <mpm@...enic.com>,
Marc Haber <mh+linux-kernel@...schlus.de>,
Eric Dumazet <dada1@...mosbay.com>,
Alan Cox <alan@...rguk.ukuu.org.uk>,
Adrian Bunk <bunk@...nel.org>, linux-kernel@...r.kernel.org,
David S. Mille
Subject: Re: Why does reading from /dev/urandom deplete entropy so much?
Theodore Tso wrote:
> Note that even paranoid applicatons should not be using /dev/random
> for session keys; again, /dev/random isn't magic, and entropy isn't
> unlimited. Instead, such an application should pull 16 bytes or so,
> and then use it to seed a cryptographic random number generator.
What good does using multiple levels of RNG do? Why seed one RNG from
another? Wouldn't it be better to have just one RNG that everybody
uses? Doesn't the act of reading from the RNG add entropy to it, since
no one reader has any idea how often and at what times other readers are
stirring the pool?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists