On Mon, Oct 14, 2013 at 5:35 PM, <[email protected]> wrote: > http://eprint.iacr.org/2013/338.pdf
"...it remains unclear if these attacks lead to actual exploitable vulnerabilities in practice." in my mtrngd for XSTORE i not only fed /dev/random when it became write-able (entropy less than full) but also fed it at regular intervals, specifically to keep the pool fresh. in the standard rng-tools rngd, you specify this parameter with the timeout parameter, "Interval written to random-device when the entropy pool is full, in seconds (default: 60)" i am pleased to see this made it into the stock rngd source! best regards, _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
