Date: Mon, 17 Jul 2000 13:16:43 -0700 (PDT) From: Kris Kennaway <kris@FreeBSD.org> To: Mark Murray <mark@grondar.za> Cc: Poul-Henning Kamp <phk@critter.freebsd.dk>, current@FreeBSD.ORG Subject: Re: randomdev entropy gathering is really weak Message-ID: <Pine.BSF.4.21.0007171315510.49901-100000@freefall.freebsd.org> In-Reply-To: <200007171459.QAA00888@grimreaper.grondar.za>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Jul 2000, Mark Murray wrote: > > What we really need is this: > > > > fetch -o http://entropy.freebsd.org/ > /dev/random > > For this to work, you'll need to encrypt the traffic. > > fetch -o https://entropy.freebsd.org/ > /dev/random > ^ > > If the world knows what they are, your bits aren't random enough. Plus you need to authenticate (and obviously trust) your entropy server and the data stream to make sure they're not actually someone else feeding you zeros. Kris -- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007171315510.49901-100000>