> -----Original Message-----
> From: [email protected] [mailto:openais-
> [email protected]] On Behalf Of Dietmar Maurer
> Sent: Dienstag, 18. August 2009 07:54
> To: [email protected]; [email protected]
> Subject: Re: [Openais] corosync trunk request user to generate entropy
> 
> We need to install corosync without user interaction, so that solution
> is even worse than the previous behavior. Can't we use /dev/urandom
> instead (AFAIK even ssh uses that to generate private keys)?

>From the urandom(4) manual page:

> A read from the /dev/urandom device will not block waiting 
> for more entropy. As a result, if there is not sufficient 
> entropy  in  the  entropy  pool, the returned values are 
> theoretically vulnerable to a cryptographic attack on the
> algorithms used by the driver.  Knowledge of how to do this 
> is not  available in the current non-classified literature ...

So I guess it is secure?

- Dietmar

_______________________________________________
Openais mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/openais

Reply via email to