I forgot to mention that the systems in question are severs that do not have
the keyboard or mouse as sources of entropy.  Yes indeed, the problem seems
a lack of entropy.  What I find surprising is that on these systems, I seem
to be able to get approx 400 bytes from /dev/random and it doesn't matter
how long the system has been running for (hours, days, weeks or months).
This seems a little odd to me.

Bruce

On Tue, Jun 10, 2008 at 11:25 PM, David Schwartz <[EMAIL PROTECTED]>
wrote:

>
> > What is the acceptable lower limit for the number of bytes for
> RAND_load_file()?
>
> Nobody can tell you what your requirements are. Some people will consider
> it
> acceptable just to read 1KB from /dev/urandom. This is only a problem if
> the
> entropy pool was never seeded, which is always at least possible.
>
> If you aren't comfortable reading from /dev/urandom, an acceptable
> compromise might be to read a small number of bytes from /dev/random
> (accepting that this might take a while in exchange for a stronger
> guarantee
> of security) and a larger number of bytes from /dev/urandom (in the hopes
> that this will increase security because it is quite likely to do so).
>
> IMO, 16 or 32 bytes from /dev/random and 256 bytes from /dev/urandom is
> sufficient for almost all imaginable applications.
>
> DS
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>

Reply via email to