On Sat, Oct 05, 2024 at 12:14:47AM +0300, Leonid Evdokimov wrote: > Hello Simon & the mailing list.
Hi, > This is a series of patches related to randomness in dnsmasq. > > It started with me noticing something lookking like entropy reuse > in rand64() and escalated quickly towards replacing SURF random > generator with ChaCha8 while I was working on other patches. > > ChaCha8 is faster & smaller than SURF and, I assume, it's equally good > for this use-case. > > I'm submitting these patches as a patch train hoping that it eases > review as the patches deal with a one issue at a time. > > Leonid Evdokimov (6): > Fix -Wshadow: rand64() was mistakenly using its own counter O_o > Make in128++ branchless in SURF rand() > Use getentropy() if possible to reduce code duplication a bit > Rekey PRNG on fork() to avoid sharing PRNG state and/or leaking it > Reseed with getentropy() ~hourly to avoid low-entropy on boot > Use ChaCha8-based {rand16,rand32,rand64} > Here a sysadmin, not a programmer. I have seen the patches. But I could not seen the improvement they bring. I hope others do see them. And are willing to express that. However, my fear is that there will be silence. We will see happens next. Groeten Geert Stappers -- Silence is hard to parse _______________________________________________ Dnsmasq-discuss mailing list Dnsmasq-discuss@lists.thekelleys.org.uk https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss