[147751] in cryptography@c2.net mail archive
Re: [Cryptography] [RNG] on RNGs, VM state, rollback, etc.
daemon@ATHENA.MIT.EDU (James A. Donald)
Sat Oct 19 16:33:20 2013
X-Original-To: cryptography@metzdowd.com
Date: Sun, 20 Oct 2013 06:25:56 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com, rng@lists.bitrot.info,
John Denker <jsd@av8n.com>
In-Reply-To: <20131019143334.GC11764@thunk.org>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 2013-10-20 00:33, Theodore Ts'o wrote:
> As I've already said, I'm open to adding code that blocks /dev/urandom
> until "enough" entropy has been collected. But that's an
> interface-visible change, and it could break things.
It will break things that should be broken, causing them to fail
visibly, when previously they failed invisibly.
More aggressive entropy collection is not really a solution, since the
total amount of entropy required is very small, and usually the supply
of entropy is very large, and yet, cannot be treated as infinite.
Since cannot be treated as infinite, solution is to not treat it as
infinite.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography