I've posted a small collection of my BSD and 
crypto-randomness-related pages at
http://www.geocities.com/SiliconValley/Code/4704/

This includes MUST code in C (and a PDF copy of Maurer's paper), How to
instrument BSD with sysctl,How to Verify your IPsec, and studies of
/dev/random.  The site collects in a permenant place the hacks 
that I've posted in various fora.  

I've included a modified BSD random_machdep.c file on the web site
which includes  sysctl  switches for various parts of
the /dev/random system.  With this, I've observed: 

By replacing the MD5 hash with an insecure version, 
(so you can 'see' into the random pool)
you can monitor, in real-time, the entropy of your
random pool ("cat /dev/urandom | uliscan")
and see the effect of various interrupts
as they temporarily boost the entropy.  This study is
in progress.










  




Reply via email to