Hello,

I'm interested in having 'openssl' version 1.0.1e
make use, by default, of hardware generated
true random numbers for creating session keys.

So far I've configured a STElectronics ST33
TPM as the majority source of /dev/random
entropy by configuring and starting the
'rngd' daemon from 'rng-tools'.  This works
well, and running

   rngtest -t10 </dev/random

shows 40Kbit/sec of continuous good quality
random data.

Next I did this:

   cd /dev
   mv urandom urandom.hold
   mknod urandom c 1 8

Which causes /dev/urandom to make use of
the /dev/random driver in the kernel.

The above sort-of works.  Some of the new
'openssl' connections to servers on this system
succeed.  However most return "cannot renegotiate"
error.

My guess is that 'openssl' is either not obtaining
enough random bytes on the first try from /dev/random
or is issuing a non-blocking read() and is told
to try-again due to transient shortages of
entropy.

Can anyone suggest a way forward here?  Having
a decent source of true random numbers I would
like to rely on that instead of pseudo random
numbers for session keys and (of course)
new long-term keys.  I find it acceptable that
brief delays in session establishment may
occur.

Thank You
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to