Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Jun 2000 08:25:17 -0500
From:      "Jacques A . Vidrine" <n@nectar.com>
To:        Kris Kennaway <kris@FreeBSD.org>
Cc:        Mark Murray <mark@grondar.za>, freebsd-current@freebsd.org, imp@freebsd.org
Subject:   Re: HEADS UP! New (incomplete) /dev/random device!
Message-ID:  <20000626082516.C18421@bone.nectar.com>
In-Reply-To: <Pine.BSF.4.21.0006251252550.42497-100000@freefall.freebsd.org>; from kris@FreeBSD.org on Sun, Jun 25, 2000 at 12:55:47PM -0700
References:  <200006251512.RAA17563@grimreaper.grondar.za> <Pine.BSF.4.21.0006251252550.42497-100000@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jun 25, 2000 at 12:55:47PM -0700, Kris Kennaway wrote:
> > > I don't know which applications depend on /dev/random providing entropy
> > > and which gather their own.
> SSH and SSL should not be used: PGP should be okay.

FWIW, a quick look indicates:

  MIT Kerberos V gathers its own ``entropy'' when generating random
  keys

  Heimdal uses /dev/random 

This matters in particular for creating keys for servers.  Session keys
may or may not be a big deal, depending on the application.
-- 
Jacques Vidrine / n@nectar.com / nectar@FreeBSD.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000626082516.C18421>