Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Jul 2000 13:16:43 -0700 (PDT)
From:      Kris Kennaway <kris@FreeBSD.org>
To:        Mark Murray <mark@grondar.za>
Cc:        Poul-Henning Kamp <phk@critter.freebsd.dk>, current@FreeBSD.ORG
Subject:   Re: randomdev entropy gathering is really weak 
Message-ID:  <Pine.BSF.4.21.0007171315510.49901-100000@freefall.freebsd.org>
In-Reply-To: <200007171459.QAA00888@grimreaper.grondar.za>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Jul 2000, Mark Murray wrote:

> > What we really need is this:
> > 
> > 	fetch -o http://entropy.freebsd.org/ > /dev/random
> 
> For this to work, you'll need to encrypt the traffic.
> 
> fetch -o https://entropy.freebsd.org/ > /dev/random
>              ^
> 
> If the world knows what they are, your bits aren't random enough.

Plus you need to authenticate (and obviously trust) your entropy server
and the data stream to make sure they're not actually someone else feeding
you zeros.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007171315510.49901-100000>