Glynn Clements <[EMAIL PROTECTED]> writes: > A quick check seems to indicate that /dev/random won't be able to > provide enough data for generating ephemeral port numbers unless the > system is *very* lightly loaded. And please do not use /dev/urandom either - it would provide enough data but empties the random pool, so that /dev/random will practically always block while waiting for new entropy. You don't need cryptographic strong random numbers. -- Werner Koch at guug.de www.gnupg.org keyid 621CC013 - To unsubscribe from this list: send the line "unsubscribe linux-net" in the body of a message to [EMAIL PROTECTED]
- randomizing tcp port binding.. CyberPsychotic
- Re: randomizing tcp port binding.. Avery Pennarun
- Re: randomizing tcp port binding.. CyberPsychotic
- Re: randomizing tcp port binding.. Glynn Clements
- Re: randomizing tcp port binding.. Werner Koch
- Re: randomizing tcp port binding.. Andi Kleen
- Re: randomizing tcp port binding.. CyberPsychotic
- Re: randomizing tcp port binding.. Avery Pennarun
- Re: randomizing tcp port binding.. CyberPsychotic
- Re: randomizing tcp port binding.. jt
- Re: randomizing tcp port binding.. Greg Stark
- Re: randomizing tcp port binding.. ekuiperba
- Re: randomizing tcp port binding.. maddog
- Re: randomizing tcp port binding.. Greg Stark
- Re: randomizing tcp port binding.. Avery Pennarun
