gnutls-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Bug#448775: Uses too much entropy (Debian Bug #343085)


From: Simon Josefsson
Subject: Re: Bug#448775: Uses too much entropy (Debian Bug #343085)
Date: Fri, 04 Jan 2008 13:20:17 +0100
User-agent: Gnus/5.110007 (No Gnus v0.7) Emacs/22.1 (gnu/linux)

Werner Koch <address@hidden> writes:

> On Fri,  4 Jan 2008 10:59, address@hidden said:
>
>> This is mostly a question for libgcrypt developers, but I believe
>> libgcrypt initializes the PRNG in a more conservative way.
>
> Right, we even implement failsafe methods in case /dev/random does not
> work like expected.  In fact we don't know ehther /dev/random is a good
> RNG or not.  There is no serious study on the quality of /dev/random and
> in the past we have seen major over-estimations on the available
> entropy.

Right, and there are studies that suggests the Linux /dev/random device
have flaws:

http://eprint.iacr.org/2006/086

Being conservative here is a good thing.  However, that does not have to
be in conflict with working efficiently.  Using a random seed file would
be one way to address both concerns.

/Simon




reply via email to

[Prev in Thread] Current Thread [Next in Thread]