[149350] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Random numbers only once

daemon@ATHENA.MIT.EDU (Tony Arcieri)
Tue Feb 4 13:02:29 2014

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <CACsn0ckZhuTonzo=0faWWqS=tjz7ByF669proJdNep9ttqdemg@mail.gmail.com>
From: Tony Arcieri <bascule@gmail.com>
Date: Mon, 3 Feb 2014 23:19:14 -0800
To: Watson Ladd <watsonbladd@gmail.com>
Cc: Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============6425536091161479049==
Content-Type: multipart/alternative; boundary=089e013a12f0513faf04f18f761d

--089e013a12f0513faf04f18f761d
Content-Type: text/plain; charset=ISO-8859-1

On Mon, Feb 3, 2014 at 9:12 PM, Watson Ladd <watsonbladd@gmail.com> wrote:

> Why does /dev/random not do this and so avoid blocking after startup?
>

The /dev/random vs /dev/urandom distinction is probably a mistake. Also
making these things files in /dev is also probably a mistake. Ideally there
would just be a system call to obtain some randomness from the kernel, then
an awful lot of work to ensure that randomness is good. It shouldn't block.

-- 
Tony Arcieri

--089e013a12f0513faf04f18f761d
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On M=
on, Feb 3, 2014 at 9:12 PM, Watson Ladd <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:watsonbladd@gmail.com" target=3D"_blank" onclick=3D"window.open(&#39;h=
ttps://mail.google.com/mail/?view=3Dcm&amp;tf=3D1&amp;to=3Dwatsonbladd@gmai=
l.com&amp;cc=3D&amp;bcc=3D&amp;su=3D&amp;body=3D&#39;,&#39;_blank&#39;);ret=
urn false;">watsonbladd@gmail.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Why does /dev/random not do this and so avoi=
d blocking after startup?<br></blockquote><div><br></div><div>The /dev/rand=
om vs /dev/urandom distinction is probably a mistake. Also making these thi=
ngs files in /dev is also probably a mistake. Ideally there would just be a=
 system call to obtain some randomness from the kernel, then an awful lot o=
f work to ensure that randomness is good. It shouldn&#39;t block.</div>

<div><br></div></div>-- <br>Tony Arcieri<br>
</div></div>

--089e013a12f0513faf04f18f761d--

--===============6425536091161479049==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============6425536091161479049==--

home help back first fref pref prev next nref lref last post