Hi Naveen,

Unfortunately, that page doesn't provide insights as to why that piece of
advice was issued.

And ultimately, even hardware TRNGs need to shuttle their outputs across
many radiating cables in order to arrive at their destination in memory,
even if we assume trusted components. So apart from the possibility of
software bugs (which could also plague USB, etc.) it's not clear to me why
the author has this opinion.

So why do you have this opinion?

Russell Leidich


On Wed, May 27, 2015 at 2:11 AM, Naveen Nathan <[email protected]> wrote:

> Avoid: userspace random number generators, havaged, prngd, egd,
> /dev/random.
>
> Source: https://gist.github.com/tqbf/be58d2d39690c3b366ad
>
> Now that's advice I can get behind.
>
> On Tue, May 26, 2015 at 03:49:14PM -0700, coderman wrote:
> > On 5/26/15, Krisztián Pintér <[email protected]> wrote:
> > > i call bullshit on this one, just as i called bullshit on havege...
> >
> > dakarand is the other to add to this set, as well as the high
> > resolution timer based userspace rng daemon mods...
> >
> > best regards,
> > _______________________________________________
> > cryptography mailing list
> > [email protected]
> _______________________________________________
> cryptography mailing list
> [email protected]
> http://lists.randombit.net/mailman/listinfo/cryptography
>
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to