The entropy pool size is configurable on some systems.  For Linux see
/proc/sys/kernel/random/poolsize

Glenn

On Wed, Jun 11, 2008 at 7:52 AM, Bruce Keats <[EMAIL PROTECTED]> wrote:

> I forgot to mention that the systems in question are severs that do not
> have the keyboard or mouse as sources of entropy.  Yes indeed, the problem
> seems a lack of entropy.  What I find surprising is that on these systems, I
> seem to be able to get approx 400 bytes from /dev/random and it doesn't
> matter how long the system has been running for (hours, days, weeks or
> months).  This seems a little odd to me.
>
> Bruce
>
> On Tue, Jun 10, 2008 at 11:25 PM, David Schwartz <[EMAIL PROTECTED]>
> wrote:
>
>>
>> > What is the acceptable lower limit for the number of bytes for
>> RAND_load_file()?
>>
>> Nobody can tell you what your requirements are. Some people will consider
>> it
>> acceptable just to read 1KB from /dev/urandom. This is only a problem if
>> the
>> entropy pool was never seeded, which is always at least possible.
>>
>> If you aren't comfortable reading from /dev/urandom, an acceptable
>> compromise might be to read a small number of bytes from /dev/random
>> (accepting that this might take a while in exchange for a stronger
>> guarantee
>> of security) and a larger number of bytes from /dev/urandom (in the hopes
>> that this will increase security because it is quite likely to do so).
>>
>> IMO, 16 or 32 bytes from /dev/random and 256 bytes from /dev/urandom is
>> sufficient for almost all imaginable applications.
>>
>> DS
>>
>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           [EMAIL PROTECTED]
>>
>
>

Reply via email to