[147751] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [RNG] on RNGs, VM state, rollback, etc.

daemon@ATHENA.MIT.EDU (James A. Donald)
Sat Oct 19 16:33:20 2013

X-Original-To: cryptography@metzdowd.com
Date: Sun, 20 Oct 2013 06:25:56 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com, rng@lists.bitrot.info, 
	John Denker <jsd@av8n.com>
In-Reply-To: <20131019143334.GC11764@thunk.org>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-10-20 00:33, Theodore Ts'o wrote:
> As I've already said, I'm open to adding code that blocks /dev/urandom
> until "enough" entropy has been collected.  But that's an
> interface-visible change, and it could break things.

It will break things that should be broken, causing them to fail 
visibly, when previously they failed invisibly.

More aggressive entropy collection is not really a solution, since the 
total amount of entropy required is very small, and usually the supply 
of entropy is very large, and yet, cannot be treated as infinite.

Since cannot be treated as infinite, solution is to not treat it as 
infinite.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post