On Mon, 2019-02-25 at 19:37 +0200, Uoti Urpala wrote: [...] > Generally you don't ever > need to use /dev/random instead of /dev/urandom unless you make > assumptions about cryptography failing. [...]
I think I agree with that, but there is no way to add entropy that unblocks getrandom() without also unblocking /dev/random. If the seed files used in two different boots are somewhat correlated, and the entropy estimation doesn't account for that, the output of /dev/random may also be somewhat correlated between the boots, which is not supposed to happen. Ben. -- Ben Hutchings The obvious mathematical breakthrough [to break modern encryption] would be development of an easy way to factor large prime numbers. - Bill Gates
signature.asc
Description: This is a digitally signed message part