Date: Thu, 18 Sep 2003 19:36:36 -0600 From: "David G. Andersen" <danderse@cs.utah.edu> To: "Devon H. O'Dell" <dodell@sitetronics.com> Cc: freebsd-security@freebsd.org Subject: Re: [Fwd: Re: FreeBSD Security Advisory FreeBSD-SA-03:12.openssh] Message-ID: <20030918193636.A94860@cs.utah.edu> In-Reply-To: <3F6A5BBF.3020102@sitetronics.com>; from dodell@sitetronics.com on Fri, Sep 19, 2003 at 03:28:31AM %2B0200 References: <3F6A5BBF.3020102@sitetronics.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Devon H. O'Dell just mooed:
>
> If I'm not mistaken, /dev/random is a pseudo-random generator, which
> means it has a certain period before it begins to repeat numbers (along
> with that it just isn't truly random). So, please correct me if I'm
> wrong, but doesn't this mean that when reading from /dev/random, you're
> 'losing' randomness/entropy/whatever you're calling it?
You're mistaken. /dev/random stops feeding you random bits
when it doesn't have enough. /dev/urandom depletes the entropy
pool, but when it starts to run out, it falls back to hashing
to generate pseudo-random sequences from the random bits that
it can obtain.
-Dave
--
work: dga@lcs.mit.edu me: dga@pobox.com
MIT Laboratory for Computer Science http://www.angio.net/
I do not accept unsolicited commercial email. Do not spam me.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030918193636.A94860>
