1995-10-31 - Re: /dev/random for FreeBSD [was: Re: /dev/random for Linux]

Header Data

From: shields@tembel.org (Michael Shields)
To: cypherpunks@toad.com
Message Hash: 3033c89930ef31f64b26f1db58ed03f0039ee7ff85fdbea6bfddcdda18da5ffb
Message ID: <473k3p$pt2@yage.tembel.org>
Reply To: <199510301925.VAA27116@grumble.grondar.za>
UTC Datetime: 1995-10-31 00:02:31 UTC
Raw Date: Tue, 31 Oct 1995 08:02:31 +0800

Raw message

From: shields@tembel.org (Michael Shields)
Date: Tue, 31 Oct 1995 08:02:31 +0800
To: cypherpunks@toad.com
Subject: Re: /dev/random for FreeBSD [was: Re: /dev/random for Linux]
In-Reply-To: <199510301925.VAA27116@grumble.grondar.za>
Message-ID: <473k3p$pt2@yage.tembel.org>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In article <199510301925.VAA27116@grumble.grondar.za>,
Mark Murray <mark@grondar.za> wrote:
> Something I didn't mention earlier; we felt that letting the unwashed
> masses read /dev/*random was not a good idea, as they could deplete
> the pool of entropy all to easily for attack purposes.

That's really just a DOS attack, isn't it?  An application that needs
true randomness should be using /dev/random, which you can slow but not
disturb, and an application that is using /dev/urandom should be ok with
less than full entropy.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMJVTqeyjYMb1RsVfAQGqYwP/W6xUdsxwCMrWlvmuPrfV4yfaYpZWt3JW
/ld8HsqyQt5XRkbNwq/hcXDle13exEaqzXe2l6qHtR3qySEaU/4WF/BgSTwqpQa+
iA6p8KL51XPluNF9oagMrmOR2J4yxMPldrx5m/+WcZRJj4mdfzxQoMQ9J4agTVsC
l2spGY8iNkA=
=9cfz
-----END PGP SIGNATURE-----
-- 
Shields.





Thread