Date: Sun, 28 Nov 1999 11:44:15 -0800 (PST) From: Kris Kennaway <kris@hub.freebsd.org> To: Warner Losh <imp@village.org> Cc: Dan Moschuk <dan@FreeBSD.ORG>, freebsd-audit@FreeBSD.ORG Subject: Re: Last random PID patch before commit Message-ID: <Pine.BSF.4.21.9911281137050.80171-100000@hub.freebsd.org> In-Reply-To: <199911281933.MAA86069@harmony.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 28 Nov 1999, Warner Losh wrote: > I believe that the entropy pool accumulates fast enough to use it for > every process, but that might be excessive and wasteful. Probably. You certainly want to reseed your random stream often, but OTOH I've found it fairly easy to drain the /dev/random pool by a couple of cooperating aggressively reading processes - in other words, there's not a whole lot there unless we keep a private pool in reserve (there was also a claim a while ago that we drastically overestimate our entropy, which I've been meaning to look into for a while). The papers by Schneier et al on www.counterpane.com on cryptographic RNGs describe the issues well. Kris > Warner ---- Just remember, as you celebrate Thanksgiving with your family feasts of turkey, cranberries, stuffing, gravy, mashed potatoes, squash, corn, cornbread, apples, pickles, dumplings, fish, orangutans, fruitbats, breakfast cereals, and so forth, to keep in mind the true reason for the season: The birth of Santa. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-audit" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.9911281137050.80171-100000>