On Mon, 7 Oct 2002, Kevin Oberman wrote: > > Obviously I would suggest the man pages (man 4 random). /dev/urandom > will never be exhausted. The numbers returned will simply become > progressively less random. (Random enough for most things, but I always > use /dev/random to make keys.)
Yes, it is true that urandom reverts back to a pnrg when the entropy pool gets low. *But* IIRC there is only one entrophy pool in the kernel, so /dev/random will stall until the entropy pool get replenished even if you read from urandom only. I need to read the source to be sure, but better safe than sorry :) This means you can DoS some app which *needs* the randomness and reads from /dev/random just by messing around with /dev/urandom. If both devices have separate entrpy pools, this is not an issue (just remember: dont play with /dev/random unless you know what you're doing) > > Both use truly random, external events to generate the entropy > pool. By default, these are generated fairly slowly and the pool is > easily exhausted. This is because the default is VERY paranoid about > your system. Agreed. Fer To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-questions" in the body of the message