From owner-freebsd-hackers@FreeBSD.ORG Fri May 31 13:59:55 2013 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 3E06B43D for ; Fri, 31 May 2013 13:59:55 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (wojtek.tensor.gdynia.pl [188.252.31.196]) by mx1.freebsd.org (Postfix) with ESMTP id BBD583A7 for ; Fri, 31 May 2013 13:59:54 +0000 (UTC) Received: from wojtek.tensor.gdynia.pl (localhost [127.0.0.1]) by wojtek.tensor.gdynia.pl (8.14.7/8.14.6) with ESMTP id r4VDxc9T008858; Fri, 31 May 2013 15:59:38 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from localhost (wojtek@localhost) by wojtek.tensor.gdynia.pl (8.14.6/8.14.6/Submit) with ESMTP id r4VDxcsH008855; Fri, 31 May 2013 15:59:38 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Date: Fri, 31 May 2013 15:59:38 +0200 (CEST) From: Wojciech Puchar To: Dirk-Willem van Gulik Subject: Re: seeding randomness in zee cloud In-Reply-To: <0BF6FBDD-47E8-44F1-BA71-A355EDCDEDB6@webweaving.org> Message-ID: References: <0BF6FBDD-47E8-44F1-BA71-A355EDCDEDB6@webweaving.org> User-Agent: Alpine 2.00 (BSF 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.2.7 (wojtek.tensor.gdynia.pl [127.0.0.1]); Fri, 31 May 2013 15:59:38 +0200 (CEST) Cc: freebsd-hackers@freebsd.org X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 May 2013 13:59:55 -0000 > .. snipped... > > # Seed Software random generator > # > cat rnd > /dev/random > > # Activate software random generator as an additional source > sysctl kern.random.sys.harvest.swi=1 > > Or does this cause a loss/reset of all entropy gathered by the hardware sofar ? no - writing to /dev/random "adds randomness"