Quoth Muli Ben-Yehuda:

> The theory behind disabling entropy gathering from network sources is
> that those can be affected (controlled?) by an attacker. There was a
> long thread about this recently on lkml, see thread starting at
> http://marc.theaimsgroup.com/?l=linux-kernel&m=114684809230875&w=2 for
> both sides of the argument.

I pretty much agree with the theory, but Ami's query is correct - whence
to get entropy in this case?

In theory, by the by, disk access can ALSO be controlled to a degree (less
than network, but still)... So - whence entropy? Shall we now start adding
external devices via RS232 (some kind of multi-cascade motion detector
;-)...


Marc

-- 
---MAV
Marc A. Volovic                                         [EMAIL PROTECTED]
Swiftouch, LTD                                             +972-544-676764

=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to