On Wednesday 30 August 2017 08:11:05 Greg Wooledge wrote:

> On Wed, Aug 30, 2017 at 11:47:24AM +1000, Zenaan Harkness wrote:
> > They don't. You ought not use /dev/urandom for key generation, use
> > /dev/random instead.
>
> The Linux man page disagrees with you.  From Debian 9 urandom(4):
>
>        The /dev/random device is a legacy interface which dates back
> to a time where the  cryptographic  primitives  used  in  the 
> implementation  of /dev/urandom were not widely trusted.  It will
> return random bytes only within the estimated number of bits of fresh
> noise in the entropy pool, blocking  if  necessary.  /dev/random is
> suitable for applications that need high quality randomness, and can
> afford indeterminate delays.
>
>    [...]
>
>    Usage
>        The  /dev/random  interface  is  considered  a  legacy 
> interface,  and /dev/urandom is preferred and sufficient in all  use 
> cases,  with  the exception  of  applications  which require
> randomness during early boot time; for  these  applications, 
> getrandom(2)  must  be  used  instead, because it will block until the
> entropy pool is initialized.

I hereby challenge this group to crack this passwd:

Uld4dFpYSkdkV1J3ZFdOclpYSUsK

And tell me how you arrived at the answer.

Cheers, Gene Heskett
-- 
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Genes Web page <http://geneslinuxbox.net:6309/gene>

Reply via email to