Date: Fri, 01 Sep 2000 14:28:58 +0200 From: Mark Murray <mark@grondar.za> To: Kris Kennaway <kris@FreeBSD.org> Cc: Adam Back <adam@cypherspace.org>, current@FreeBSD.org, jeroen@vangelderen.org, yarrow@zeroknowledge.com Subject: Re: yarrow & /dev/random Message-ID: <200009011228.e81CSwR04242@grimreaper.grondar.za> In-Reply-To: <Pine.BSF.4.21.0009010251290.27842-100000@freefall.freebsd.org> ; from Kris Kennaway <kris@FreeBSD.org> "Fri, 01 Sep 2000 03:06:28 MST." References: <Pine.BSF.4.21.0009010251290.27842-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> > PC's are pretty low-entropy devices; users who need lots of random > > bits (as opposed to a steady supply of random numbers) are arguably > > going to need to go to extraordinary lengths to get them; their > > own statistical analysis is almost certainly going to be required. > > I claim this to be untrue: my tests show an ordinary sound card (with no > recording source, at maximum input gain) will provide far more > (high-quality) entropy than Yarrow can make use of under even the most > punishing loads. Kris; could you come up with some kind of proof-of-concept for this? I don't want to steal a sound card, but being able to use one at the user's request is good; I'd need kernel-mode code to do some harvesting. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200009011228.e81CSwR04242>