To keep the this bug uptodate: the latest libgcrypt upload reduces the amount of entropy required to initialize the randomness pool in libgcrypt (done each time randomness functions are called by applications that doesn't use a seed file) about 100 times. From typical 360kb to 3kb of /dev/urandom consumption. That still seems to deplete the entropy pool in the kernel by a significant amount, though, but the change could be enough to solve the problem in some situations.
/Simon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

