[Cryptography] TRNG related review: rngd and /dev/random

Theodore Ts'o tytso at mit.edu
Thu Jan 21 20:41:22 EST 2016


On Thu, Jan 21, 2016 at 11:35:55AM -0800, John-Mark Gurney wrote:
> The real solution is for Linux to not be broken...  You just can't simply
> deplete a large entropy pool ever!  If someone ever figures out how to
> take 2^64 bytes of some CSPRNG (say AES in counter mode, or hash) and
> extract the key, then the underlying cryptographic primitive will be
> considered broken, and it'll be replaced.

The real solution for Linux is to just user getrandom(2) and be happy.
With the flags set to zero, it works just like OpenBSD's getentropy(2).

http://man7.org/linux/man-pages/man2/getrandom.2.html

Cheers,

						- Ted


More information about the cryptography mailing list