[ https://issues.apache.org/jira/browse/HADOOP-10734?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14056977#comment-14056977 ]
Colin Patrick McCabe commented on HADOOP-10734: ----------------------------------------------- Yi and I had an offline conversation about this. Essentially, there are some issues with {{/dev/urandom}} and {{/dev/random}} on Linux. One is that they're not portable to BSD and other OSes, whereas the openssl stuff is. Another is that if {{/dev/urandom}} is incorrectly seeded, the randomness may not be adequate. There's more background on the difficulty of using {{/dev/urandom}} for portable cryptography here: http://insanecoding.blogspot.com/2014/05/a-good-idea-with-bad-usage-devurandom.html For these reasons, I'm +1 on v3 of the patch (Yi's version that uses openssl). Thanks, guys. > Implementation of true secure random with high performance using hardware > random number generator. > -------------------------------------------------------------------------------------------------- > > Key: HADOOP-10734 > URL: https://issues.apache.org/jira/browse/HADOOP-10734 > Project: Hadoop Common > Issue Type: Sub-task > Components: security > Affects Versions: fs-encryption (HADOOP-10150 and HDFS-6134) > Reporter: Yi Liu > Assignee: Yi Liu > Fix For: fs-encryption (HADOOP-10150 and HDFS-6134) > > Attachments: HADOOP-10734-fs-enc.004.patch, HADOOP-10734.1.patch, > HADOOP-10734.2.patch, HADOOP-10734.3.patch, HADOOP-10734.patch > > > This JIRA is to implement Secure random using JNI to OpenSSL, and > implementation should be thread-safe. > Utilize RdRand to return random numbers from hardware random number > generator. It's TRNG(True Random Number generators) having much higher > performance than {{java.security.SecureRandom}}. > https://wiki.openssl.org/index.php/Random_Numbers > http://en.wikipedia.org/wiki/RdRand > https://software.intel.com/en-us/articles/performance-impact-of-intel-secure-key-on-openssl -- This message was sent by Atlassian JIRA (v6.2#6252)