Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Jul 2000 10:02:16 +0200
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        Kris Kennaway <kris@FreeBSD.ORG>
Cc:        "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, Mark Murray <mark@grondar.za>, current@FreeBSD.ORG
Subject:   Re: randomdev entropy gathering is really weak 
Message-ID:  <2769.964339336@critter.freebsd.dk>
In-Reply-To: Your message of "Sat, 22 Jul 2000 17:41:15 PDT." <Pine.BSF.4.21.0007221720110.39258-100000@freefall.freebsd.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.4.21.0007221720110.39258-100000@freefall.freebsd.org>, Kri
s Kennaway writes:
>On Sat, 22 Jul 2000, Jeroen C. van Gelderen wrote:
>
>> I agree that you need long RSA keys ... but the real 
>> discussion isn't really about key length but rather about 
>> the overall complexity of attacking the key:
>
>Okay, using RSA keys wasn't the best example to pick, but Yarrow also
>seems easy to misuse in other cases: for example if you want to generate
>multiple 256-bit symmetric keys (or other random data) at the same time,

Kris,

Obviously, if you need more randomness than a stock FreeBSD system
can provide you with, you add hardware to give you more randomness.

In other words, and more bluntly:  Please shut up now, will you ?

--
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2769.964339336>