On 04/05/2018 04:06, Paul Wise wrote:
On Thu, May 3, 2018 at 4:53 PM, richard lucassen wrote:
There is also an big increase in time before random is initialized:
...
One of the consequences is that openntpd (or a program like
rdate) hangs until the crng is initialized.
What do these two programs require entropy for?
security:
Integrates the latest secure API advances from OpenBSD such as
getentropy(2), arc4random(3) (a fail-safe CSRNG that works in chroot
environments), and reallocarray(3) (an integer overflow-checking
malloc/calloc/realloc replacement).[1]
you can read more detail on NTP RFC[2]
Ciao
Davide
[1] http://www.openntpd.org/features.html
[2] https://www.ietf.org/rfc/rfc1305.txt
https://www.ietf.org/rfc/rfc5905.txt