On Wed, Jun 28, 2017 at 11:41:11AM +1000, Peter Waltenberg wrote:
> And FYI. On systems not backed with hardware RNG's /dev/random is 
> extremely slow. 1-2 bytes/second is a DOS attack on it's own without any 
> other effort required.

Please, stop suggesting the use /dev/random.  The right answer is
/dev/urandom or getrandom(2).

                                                - Ted
-- 
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to