[Cryptography] TRNG related review: rngd and /dev/random
Theodore Ts'o
tytso at mit.edu
Thu Jan 21 20:41:22 EST 2016
On Thu, Jan 21, 2016 at 11:35:55AM -0800, John-Mark Gurney wrote:
> The real solution is for Linux to not be broken... You just can't simply
> deplete a large entropy pool ever! If someone ever figures out how to
> take 2^64 bytes of some CSPRNG (say AES in counter mode, or hash) and
> extract the key, then the underlying cryptographic primitive will be
> considered broken, and it'll be replaced.
The real solution for Linux is to just user getrandom(2) and be happy.
With the flags set to zero, it works just like OpenBSD's getentropy(2).
http://man7.org/linux/man-pages/man2/getrandom.2.html
Cheers,
- Ted
More information about the cryptography
mailing list