> -----Original Message----- > From: [email protected] [mailto:openais- > [email protected]] On Behalf Of Dietmar Maurer > Sent: Dienstag, 18. August 2009 07:54 > To: [email protected]; [email protected] > Subject: Re: [Openais] corosync trunk request user to generate entropy > > We need to install corosync without user interaction, so that solution > is even worse than the previous behavior. Can't we use /dev/urandom > instead (AFAIK even ssh uses that to generate private keys)?
>From the urandom(4) manual page: > A read from the /dev/urandom device will not block waiting > for more entropy. As a result, if there is not sufficient > entropy in the entropy pool, the returned values are > theoretically vulnerable to a cryptographic attack on the > algorithms used by the driver. Knowledge of how to do this > is not available in the current non-classified literature ... So I guess it is secure? - Dietmar _______________________________________________ Openais mailing list [email protected] https://lists.linux-foundation.org/mailman/listinfo/openais
