From eugen@leitl.org Tue Oct 15 04:30:57 2013 From: Eugen Leitl To: cypherpunks@lists.cpunks.org Subject: Re: [cryptography] /dev/random is not robust Date: Tue, 15 Oct 2013 10:30:54 +0200 Message-ID: <20131015083054.GM10405@leitl.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============4569405141880095248==" --===============4569405141880095248== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable ----- Forwarded message from coderman ----- Date: Mon, 14 Oct 2013 18:07:57 -0700 From: coderman To: David Johnston Cc: Cryptography List , Discussion of cryptograp= hy and related Subject: Re: [cryptography] /dev/random is not robust Message-ID: On Mon, Oct 14, 2013 at 5:35 PM, wrote: > http://eprint.iacr.org/2013/338.pdf "...it remains unclear if these attacks lead to actual exploitable vulnerabilities in practice." in my mtrngd for XSTORE i not only fed /dev/random when it became write-able (entropy less than full) but also fed it at regular intervals, specifically to keep the pool fresh. in the standard rng-tools rngd, you specify this parameter with the timeout parameter, "Interval written to random-device when the entropy pool is full, in seconds (default: 60)" i am pleased to see this made it into the stock rngd source! best regards, _______________________________________________ cryptography mailing list cryptography(a)randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- --=20 Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5 --===============4569405141880095248==--