From owner-freebsd-arch@FreeBSD.ORG Mon Aug 20 18:49:17 2012 Return-Path: Delivered-To: freebsd-arch@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 47817106566C for ; Mon, 20 Aug 2012 18:49:17 +0000 (UTC) (envelope-from benlaurie@gmail.com) Received: from mail-yx0-f182.google.com (mail-yx0-f182.google.com [209.85.213.182]) by mx1.freebsd.org (Postfix) with ESMTP id 04CD28FC12 for ; Mon, 20 Aug 2012 18:49:16 +0000 (UTC) Received: by yenl7 with SMTP id l7so6454520yen.13 for ; Mon, 20 Aug 2012 11:49:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:to:content-type; bh=QYUkDKve7g2c/YDdDI6tJiNDYz6GQKqTYSW8+l+/wm0=; b=ZwjmsPG3cOI7AB2Jmxf0LSY/hC0MBb86lmf3Ig2MDKoLTuYrvR7bY6EQvnXnuf+R3g aRtIOF335zRG8wgaR5zCRF5J7vawTZeR1ibreDDHGu7UoVsGnXXNb0f+/bW15lmu6J/T 17dzK3F5DWIc9OYwDiFDg0pfUhfxE7w7G5aDDrDYVtqQdd6HxcBIetmxqoVFY7KuULCO yyMS7M8XvXxSeJ9H7t0Wtg52QM6FN1v5PmjDZVoAGg3MPNQb7/bdVOwtwvpcKa2ZMaeS 1BNFIKfMcQO6svcK3ib7dX6pyFILMfhoP6Eo7pBz9QzitjgpUsHbwfDXqDKtE0P2aCE4 oz3g== MIME-Version: 1.0 Received: by 10.50.194.165 with SMTP id hx5mr10876949igc.56.1345488556147; Mon, 20 Aug 2012 11:49:16 -0700 (PDT) Sender: benlaurie@gmail.com Received: by 10.50.101.232 with HTTP; Mon, 20 Aug 2012 11:49:16 -0700 (PDT) Date: Mon, 20 Aug 2012 19:49:16 +0100 X-Google-Sender-Auth: e6mKEiTdUco1rTv_Rs4tkHRGc5E Message-ID: From: Ben Laurie To: freebsd-arch@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Subject: /dev/random X-BeenThere: freebsd-arch@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussion related to FreeBSD architecture List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Aug 2012 18:49:17 -0000 Apparently /dev/random uses h/w PRNGs if available, discarding all other sources of randomness. This seems like a mistake to me - we should fix it. Also, it seems that entropy is available in detailed interrupt timing (see http://www.issihosts.com/haveged/) which might be useful on entropy-starved systems - I suspect we are not exploiting this source, and in light of recent developments, we probably should be, Comments?