ntpkeygen patch

Sanjeev Gupta ghane0 at gmail.com
Sat Jan 7 07:52:28 UTC 2017


On Sat, Jan 7, 2017 at 7:16 AM, Daniel Franke <dfoxfranke at gmail.com> wrote:

> In any case, please *don't* switch to reading from /dev/random, or
> monitoring /proc/sys/kernel/random/entropy_avail, or any similar hack.
> The notion that it's ever possible to "run out" of entropy once the
> pool has been seeded with an adequate quantity is based on an
> insidious misunderstanding of how CSPRNGs work.
>

Thank you.

On the supposed disadvantages of /dev/urandom , and why no true
cryptographer would use /dev/urandom, I cite:
http://www.2uo.de/myths-about-urandom/#experts

(The page summarizes, at length, the issues involved.)

-- 
Sanjeev Gupta
+65 98551208     http://www.linkedin.com/in/ghane
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20170107/862e4ff1/attachment.html>


More information about the devel mailing list