On Wed, Aug 21, 2013 at 5:41 AM, Ben Laurie <b...@links.org> wrote:
> Something needs to be done, but won't this re-introduce the problem of
> /dev/random starvation, leading to more use of /dev/urandom (on platforms
> where this is a problem)?
>
> Mixing in the time seems like a safer solution that should also fix the
> problem. Possibly only when the PID changes.

Stirring in time and PID seems like just a fail-safe.  Some bytes from
/dev/urandom should also be added -- it won't hang once seeded (or
ever on Linux, but hopefully a simple service can be added by users to
seed urandom from random).  Provided one read from /dev/random has
been done I think perturbing the pool with time + PID + urandom should
suffice.

Nico
--
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to