Re: using TRNG via /dev/random

2013-09-23 Thread starlight . 2013z3
At 12:59 9/23/2013 -0700, Michael Sierchio wrote: > >I'll repeat myself - the fact that the >/dev/random implementation you're using >blocks is a serious design flaw. Convince Linus, the GPG developers et al.--not me. Till then I respect their view as embodied by the latest implementation of rand

Re: using TRNG via /dev/random

2013-09-23 Thread starlight . 2013z3
At 20:27 9/23/2013 +0200, Richard Könning wrote: >/dev/random is a PRNG which blocks when the (crude) >entropy estimation of the entropy pool falls below a >limit. Besides this there are afaik no big >differences between /dev/random and /dev/urandom. In the sense that all TRNG outputs are run th

Re: using TRNG via /dev/random

2013-09-22 Thread starlight . 2013z3
No /dev/urandom is a PRNG. /dev/random is a TRNG. Read the code https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/drivers/char/random.c?id=272b98c6455f00884f0350f775c5342358ebb73f The TPM here generates 40Kbits/sec, or 5000 bytes/sec--more than enough for the situation at han

Re: using TRNG via /dev/random

2013-09-22 Thread starlight . 2013z3
Not interested in BSD or Yarrow PRNG. Not interested in any PRNG. Interested in True RNG from hardware as mixed by Theodore Ts'o excellent, predominant and continually evolving (https://lkml.org/lkml/2013/9/13/624) "/dev/random". Have more than enough TRNG for the needs of the servers in question

using TRNG via /dev/random

2013-09-21 Thread starlight . 2013z3
Hello, I'm interested in having 'openssl' version 1.0.1e make use, by default, of hardware generated true random numbers for creating session keys. So far I've configured a STElectronics ST33 TPM as the majority source of /dev/random entropy by configuring and starting the 'rngd' daemon from 'rng