Date: Mon, 26 Jun 2000 08:25:17 -0500 From: "Jacques A . Vidrine" <n@nectar.com> To: Kris Kennaway <kris@FreeBSD.org> Cc: Mark Murray <mark@grondar.za>, freebsd-current@freebsd.org, imp@freebsd.org Subject: Re: HEADS UP! New (incomplete) /dev/random device! Message-ID: <20000626082516.C18421@bone.nectar.com> In-Reply-To: <Pine.BSF.4.21.0006251252550.42497-100000@freefall.freebsd.org>; from kris@FreeBSD.org on Sun, Jun 25, 2000 at 12:55:47PM -0700 References: <200006251512.RAA17563@grimreaper.grondar.za> <Pine.BSF.4.21.0006251252550.42497-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jun 25, 2000 at 12:55:47PM -0700, Kris Kennaway wrote: > > > I don't know which applications depend on /dev/random providing entropy > > > and which gather their own. > SSH and SSL should not be used: PGP should be okay. FWIW, a quick look indicates: MIT Kerberos V gathers its own ``entropy'' when generating random keys Heimdal uses /dev/random This matters in particular for creating keys for servers. Session keys may or may not be a big deal, depending on the application. -- Jacques Vidrine / n@nectar.com / nectar@FreeBSD.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000626082516.C18421>