Florian Weimer dixit: >I'd also see a change that limits the number of bytes which is read from >/dev/urandom (32 or fewer should be enough). I'm concerned about >looping shell scripts darinign entropy from the pool at an unacceptably >high rate.
For things like that, the OpenBSD and MirBSD kernels have /dev/arandom, which itself is also generated from arc4random(9). It's interesting that things like that haven't yet been picked up by other operating systems. (While arandom(4) only has 256 bytes (RC4) of internal state, and Linux random/urandom has 512, OpenBSD/MirBSD has 4096, the security of arandom increases the more users it has, and our kernel uses it internally quite heavily too.) bye, //mirabilos -- 13:22⎜«neurodamage» mira, what's up man? I have a CVS question for you in #cvs 13:22⎜«neurodamage» since you're so good with it ☺ 13:28⎜«neurodamage:#cvs» i love you 13:28⎜«neurodamage:#cvs» you're a handy guy to have around for systems stuff ☺ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]