Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 28 Feb 2005 12:13:08 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        Ted Mittelstaedt <tedm@toybox.placo.com>
Cc:        Kris Kennaway <kris@obsecurity.org>
Subject:   Re: /dev/io , /dev/mem : only used by Xorg?
Message-ID:  <20050228201308.GC70059@xor.obsecurity.org>
In-Reply-To: <LOBBIFDAGNMAMLGJJCKNEEJDFAAA.tedm@toybox.placo.com>
References:  <20050228124023.GH1672@alzatex.com> <LOBBIFDAGNMAMLGJJCKNEEJDFAAA.tedm@toybox.placo.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--0lnxQi9hkpPO77W3
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Feb 28, 2005 at 04:58:02AM -0800, Ted Mittelstaedt wrote:

> Yes - there's some random testing suites on the Internet, find a
> few and compile them. (ENT for example) Run them repeatedly and see what
> happens.
>=20
> Part of the problem is that BY DEFAULT the random device DOES NOT
> look at interrupts.  See the man page for rndcontrol.  Presumably
> the system admin of the system knows this and looks at his dmesg
> output to see which irq's are assigned to network cards and hard
> disks (which are fairly good sources of randomness) and sets the
> random device to use these.  In practice this isn't something mentioned
> in the install docs so it is very unlikely many people know.
>=20
> Another strange thing is that /dev/random should block when it
> runs out of entropy - it doesen't seem to do so, however.  And the
> device doesen't seem to gain entropy that quickly.

No, it should not block because it's not defined to block and that
would be a bad interface anyway.  It does return as many bytes as it
can, and if the application wants more entropy than given then it can
either poll, or fall back to alternative mechanisms as it sees fit
(blocking would prevent this).

Anyway, all your concerns are moot for 5.x.

Kris
--0lnxQi9hkpPO77W3
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)

iD8DBQFCI3tUWry0BWjoQKURAhMzAKDn6orujolRb5uFecKzDRGsuErjNgCfYpaw
XvpBZRYuyBks/MD0vP1KTM8=
=W9oP
-----END PGP SIGNATURE-----

--0lnxQi9hkpPO77W3--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050228201308.GC70059>