On Tue, Mar 26, 2024 at 7:12 PM Björn Persson wrote:
>
> Jeffrey Walton wrote:
> > For what you want to do, and if I am parsing it correctly... I would
> > write a daemon in C [...]
>
> Only in the unlikely case that both RNGD and SCDrand turn out unsuitable
> somehow. Writing and compiling a daem
Jeffrey Walton wrote:
> For what you want to do, and if I am parsing it correctly... I would
> write a daemon in C [...]
Only in the unlikely case that both RNGD and SCDrand turn out unsuitable
somehow. Writing and compiling a daemon is no less work than compiling
an already written daemon.
> The
; GnuPG at least has a daemon called scdaemon. Is that what you mean? So
> how would I tell that to fetch random data through PKCS #11 and write
> to /dev/random?
For what you want to do, and if I am parsing it correctly... I would
write a daemon in C to collect the entropy from the source
s job requires a daemon. OpenSSL is a library. Or do you mean its
command-line tool? So how would I tell that to fetch random data
through PKCS #11?
GnuPG at least has a daemon called scdaemon. Is that what you mean? So
how would I tell that to fetch random data through PKCS #11 and write
to /d
On Mon, Mar 25, 2024 at 4:33 PM Björn Persson wrote:
>
> In a quest to acquire hardware random number generators for seeding
> /dev/random on servers that lack a built-in entropy source, I'm
> investigating how random data can be obtained from a security key such
> as a Ni
because the
shop didn't like my card number.
> On their mailing list however, there
> is a recent discussion about whether there any point. The conclusion
> seems to be "not really". Thread starts here:
>
> http://lists.ourshack.com/pipermail/discuss/2024-March/00
On Mon, Mar 25, 2024 at 06:09:02PM -0400, e...@gmx.us wrote:
> On 3/25/24 17:27, Andy Smith wrote:
> > The thread covers how to make rngd feed /dev/random from a OneRNG in
> > Debian 12, but it is no longer possible to tell if that does
> > anything useful.
>
> If not f
On 3/25/24 17:27, Andy Smith wrote:
The thread covers how to make rngd feed /dev/random from a OneRNG in
Debian 12, but it is no longer possible to tell if that does
anything useful.
If not from devices like this, from where does Debian get its randomness?
--
For is it not written
Hi,
On Mon, Mar 25, 2024 at 09:24:23PM +0100, Björn Persson wrote:
> Does anyone know of another way to obtain random data from devices of
> this kind?
I have some EntropyKeys and some OneRNGs. I have the rngd packaged
in Debian feeding /dev/random from them.
This had an actual noti
Hello!
In a quest to acquire hardware random number generators for seeding
/dev/random on servers that lack a built-in entropy source, I'm
investigating how random data can be obtained from a security key such
as a Nitrokey, Yubikey or a similar device.
RNGD version 6 from https://githu
On Mon, Aug 4, 2014 at 7:52 PM, Joel Rees wrote:
> On Sat, Aug 2, 2014 at 11:01 AM, Joel Rees wrote:
>> [...]
>>
>> Now, the random typing is not necessary.
>
> Well, it's not as rosy as I thought, for /dev/random:
>
>
> duty@deb
On Sat, Aug 2, 2014 at 11:01 AM, Joel Rees wrote:
> [...]
>
> Now, the random typing is not necessary.
Well, it's not as rosy as I thought, for /dev/random:
duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=16
if=/dev/random iflag=fullblock of=randum
On Fri, 1 Aug 2014 12:15:22 -0700
Bob Holtzman wrote:
> On Fri, Aug 01, 2014 at 04:34:50PM +0100, Lisi Reisz wrote:
> > On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> > > Thanks for reading
> >
> > I found it unreadable. Please let some air in!!
>
> Thank God. I thought I
On Fri, 1 Aug 2014 17:49:02 +0100
Lisi Reisz wrote:
> On Friday 01 August 2014 17:02:45 B wrote:
> > But you didn't say it in your rant…
>
> I didn't rant.
>
> Lisi
It's twu, it's twu! Lisi wrote two short sentences that took up less
than one line. No rant. Her point was very succinct, com
On Fri, 1 Aug 2014 17:48:33 +0200
B wrote:
> On Fri, 1 Aug 2014 16:34:50 +0100
> Lisi Reisz wrote:
>
> > On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> > > Thanks for reading
> >
> > I found it unreadable. Please let some air in!!
>
> This is a common deformation in
On Fri, 1 Aug 2014 16:34:50 +0100
Lisi Reisz wrote:
> On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> > Thanks for reading
>
> I found it unreadable. Please let some air in!!
>
> Lisi
LOL
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject
(For Lisi and Bob and others ;-/)
On Fri, Aug 1, 2014 at 8:41 AM, wrote:
> As many of you know, /dev/random is a source of random bits that are
> suitable for use in cryptographic analysis.
Wikipedia, stackoverflow, and other places have useful entries on
random numbers, randomness, a
Okay, the following was old information. REALLY old information:
On Fri, Aug 1, 2014 at 8:51 PM, Joel Rees wrote:
> On Fri, Aug 1, 2014 at 8:41 AM, wrote:
>> As many of you know, /dev/random is a source of random bits that are
>> suitable for use
>
> some uses
>
>
Hi,
On 01/08/14 18:06, Darac Marjal wrote:
> On Fri, Aug 01, 2014 at 01:50:44AM +0200, B wrote:
>> On Thu, 31 Jul 2014 16:41:01 -0700
>> "" wrote:
>>
>>> whatever experience you want to share.
>>
>> use haveged, it feeds /dev/random with a
On Vi, 01 aug 14, 17:48:33, B wrote:
> On Fri, 1 Aug 2014 16:34:50 +0100
> Lisi Reisz wrote:
>
> > On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> > > Thanks for reading
> >
> > I found it unreadable. Please let some air in!!
>
> This is a common deformation inducted b
On Fri, Aug 01, 2014 at 04:34:50PM +0100, Lisi Reisz wrote:
> On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> > Thanks for reading
>
> I found it unreadable. Please let some air in!!
Thank God. I thought I'd finally lost it.
--
Bob Holtzman
Giant intergalactic brain-suckin
On Friday 01 August 2014 17:02:45 B wrote:
> But you didn't say it in your rant…
I didn't rant.
Lisi
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201408011749.
On Fri, Aug 01, 2014 at 01:50:44AM +0200, B wrote:
> On Thu, 31 Jul 2014 16:41:01 -0700
> "" wrote:
>
> > whatever experience you want to share.
>
> use haveged, it feeds /dev/random with a reservoir.
I'd like to chime in that I recently installed ha
On Fri, 1 Aug 2014 16:53:09 +0100
Lisi Reisz wrote:
> I'm glad you live in a world where everyone has 20/20 vision and
> disability is unheard of. Some of us are not so lucky. It is 15
> years since I was able to read a book.
But you didn't say it in your rant…
> Try to learn a little tolera
On Friday 01 August 2014 16:48:33 B wrote:
> Take your time and use a very old and well known cure
> as an every day mental hygiene: forget the web and use
> something made in paper called "a book"; you'll see,
> it will open your horizons and your mind ;)
I'm glad you live in a world where ev
On Fri, 1 Aug 2014 16:34:50 +0100
Lisi Reisz wrote:
> On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> > Thanks for reading
>
> I found it unreadable. Please let some air in!!
This is a common deformation inducted by the web: people
tend to reject what is more than 10 lines
On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
> Thanks for reading
I found it unreadable. Please let some air in!!
Lisi
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive:
ike a computer, true random numbers can only be
retrieved by thermal noise in resistors or similar processes for which a
computer isn't designed. Besides, even if /dev/random is only pseudo-random,
guessing its output is hard enough to consider it as a true RNG for
common operations because,
On Fri, Aug 1, 2014 at 8:41 AM, wrote:
> As many of you know, /dev/random is a source of random bits that are
> suitable for use
some uses
> in cryptographic analysis. [...]
> Just how often do you have to poke at the keyboard? And
> when you do poke at it, about how many key
gt; differs from /dev/urandom in that /dev/random blocks and does not give
>> any bits if there have not been enough keystrokes since the last call
>> to replenish the supply of entropy in its entropy store. In contrast,
> As far as I know, keystrokes aren't the only monitored data
On Jo, 31 iul 14, 16:41:01, pecon...@mesanetworks.net wrote:
>
> Just how often do you have to poke at the keyboard? And
> when you do poke at it, about how many key presses do you make before
> you get the number of bits you requested? I'm wondering is this a
> event with which many Debianers are
Le jeudi 31 juillet 2014 à 16:41:01 -0700, pecon...@mesanetworks.net a écrit:
> not generated by the functioning of the computer, but from something
> like the keystroke times of a human asking for help on this list. It
> differs from /dev/urandom in that /dev/random blocks and does not g
On 07/31/2014 04:41 PM, pecon...@mesanetworks.net wrote:
Just how often do you have to poke at the keyboard? And
when you do poke at it, about how many key presses do you make before
you get the number of bits you requested?
Whenever I do a fresh system build, I use /dev/random to generate a
On Thu, 31 Jul 2014 16:41:01 -0700
"" wrote:
> whatever experience you want to share.
use haveged, it feeds /dev/random with a reservoir.
--
Pazns: U don't know about the drawer method?
Pazns: U take your schoolbag, empty it in a drawer, close it,
hop! clean up done!
As many of you know, /dev/random is a source of random bits that are
suitable for use in cryptographic analysis. The software supporting
/dev/random collects random time data from monitoring events that are
not generated by the functioning of the computer, but from something
like the keystroke
Pascal Hambourg:
> Pol Hallen a écrit :
>>
>>> /dev/random is cryptographically more secure.
>>
>> do you mean /dev/urandom is [...]?
>
> Not here.
>
>>> /dev/random is faster.
>
> But here.
> /dev/random is more random.
> /d
> Hi folks!
>
> I need create a block file, later use it like archive (with dm).
>
> What is better use?
>
> /dev/random or /dev/urandom?
>
> thanks!
>
> Pol
>
You might want to install haveged. You can use that directly without
affecting your system
Pol Hallen a écrit :
>> Define "better".
>
> better = secure (high level of security) :-)
>
>> /dev/random is cryptographically more secure.
>
> do you mean /dev/urandom is [...]?
Not here.
>> /dev/random is faster.
But here.
/dev/random is mo
Hello List,
On 21/04/13 20:04, Pol Hallen wrote:
Define "better".
better = secure (high level of security) :-)
/dev/random is cryptographically more secure.
do you mean /dev/urandom is [...]?
/dev/random is faster.
thanks!
man 4 random
Pol
hth,
Jerome
--
To U
> Define "better".
better = secure (high level of security) :-)
> /dev/random is cryptographically more secure.
do you mean /dev/urandom is [...]?
> /dev/random is faster.
thanks!
Pol
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subj
Pol Hallen:
> Hi folks!
>
> I need create a block file, later use it like archive (with dm).
>
> What is better use?
>
> /dev/random or /dev/urandom?
Define "better". /dev/random is cryptographically more secure.
/dev/random is faster.
J.
--
I lust after stra
Hi folks!
I need create a block file, later use it like archive (with dm).
What is better use?
/dev/random or /dev/urandom?
thanks!
Pol
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.o
I'm making a random number generator out of bit and Arduino
but that isn't the question
my Question is is it possible to use a serial imput from the Arduino
as /dev/random
I've no idea what to even google to do this
any help or pointers where to start would be fantastic
Dick
bit and Arduino
> but that isn't the question
>
>
> my Question is is it possible to use a serial imput from the Arduino
> as /dev/random
> I've no idea what to even google to do this
>
> any help or pointers where to start would be fantastic
>
>
> Dick
>
>
On Thu Jan 14, 2010 at 01:43:39 +0100, "Stanis??aw T. Findeisen" wrote:
> I am trying to generate an SSL key using OpenSSL and /dev/random .
> However, it looks that the entropy generation rate is very low.
..
> Any ideas? You can try this:
You can see the amount of av
I am trying to generate an SSL key using OpenSSL and /dev/random . However, it
looks that the entropy generation rate is very low. Everything works in less
than a second if I use /dev/urandom, but with /dev/random I can strace the
process and see it reading about 8 bytes per second (even though
46 matches
Mail list logo