"Why does ntpkeygen pass a low entropy ignored seed into SystemRandom?""

Gary E. Miller gem at rellim.com
Wed Jan 4 04:07:39 UTC 2017


Yo Mark!

On Wed, 04 Jan 2017 03:53:02 +0000
Mark Atwood <fallenpegasus at gmail.com> wrote:

> "Why does ntpkeygen pass a low entropy ignored seed into
> SystemRandom?

Its a start.  I guess I could grab something from /dev/random to
add to the mix.

> It's ignored, so it doesn't matter, but it's the type
> of error which concerns me."

I'm reading the man page, it is NOT ignored, just not ideal.

    https://docs.python.org/2/library/random.html

This relates to a frequently reocurring discussion on LKM. The Linux
kernel uses a number of low entropy sources to make /dev/random.
The feeling is that adding any small amount entropy can not hurt and
might help. Entropy tends to be additive.

More worrying to me is that it is a wrapper on os.urandom(), not os.random()

Lemme see if I can sex it up a bit.

RGDS                                                 Veritas liberabit vos
GARY                                                     Quid est veritas?
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
gem at rellim.com  Tel:+1 541 382 8588
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20170103/6b472bc2/attachment.bin>


More information about the devel mailing list