Date: Fri, 31 May 2013 13:02:43 +0100 From: RW <rwmaillists@googlemail.com> To: freebsd-hackers@freebsd.org Subject: Re: seeding randomness in zee cloud Message-ID: <20130531130243.18fb9a30@gumby.homeunix.com> In-Reply-To: <0BF6FBDD-47E8-44F1-BA71-A355EDCDEDB6@webweaving.org> References: <0BF6FBDD-47E8-44F1-BA71-A355EDCDEDB6@webweaving.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 31 May 2013 12:01:02 +0200 Dirk-Willem van Gulik wrote: > Now we happen to have very easy access to blocks of 1024bits of > randomness from a remote server in already nicely PKI signed packages > (as it is needed later for something else). > > Is it safe to simply *add* those with: > > set -1 > # fetch randomness & check signature > .. snipped... > > # Seed Software random generator > # > cat rnd > /dev/random To be on the safe side you should sleep for about 0.5 seconds after this > > # Activate software random generator as an additional source > sysctl kern.random.sys.harvest.swi=1 IIRC this doesn't do anything
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130531130243.18fb9a30>