Date: Sun, 23 Jul 2000 10:02:16 +0200 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: Kris Kennaway <kris@FreeBSD.ORG> Cc: "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, Mark Murray <mark@grondar.za>, current@FreeBSD.ORG Subject: Re: randomdev entropy gathering is really weak Message-ID: <2769.964339336@critter.freebsd.dk> In-Reply-To: Your message of "Sat, 22 Jul 2000 17:41:15 PDT." <Pine.BSF.4.21.0007221720110.39258-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.4.21.0007221720110.39258-100000@freefall.freebsd.org>, Kri s Kennaway writes: >On Sat, 22 Jul 2000, Jeroen C. van Gelderen wrote: > >> I agree that you need long RSA keys ... but the real >> discussion isn't really about key length but rather about >> the overall complexity of attacking the key: > >Okay, using RSA keys wasn't the best example to pick, but Yarrow also >seems easy to misuse in other cases: for example if you want to generate >multiple 256-bit symmetric keys (or other random data) at the same time, Kris, Obviously, if you need more randomness than a stock FreeBSD system can provide you with, you add hardware to give you more randomness. In other words, and more bluntly: Please shut up now, will you ? -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD coreteam member | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2769.964339336>