Glynn Clements <[EMAIL PROTECTED]> writes:

> A quick check seems to indicate that /dev/random won't be able to
> provide enough data for generating ephemeral port numbers unless the
> system is *very* lightly loaded.

And please do not use /dev/urandom either - it would provide enough data 
but empties the random pool, so that /dev/random will practically always 
block while waiting for new entropy.  You don't need cryptographic
strong random numbers.

-- 
Werner Koch at guug.de           www.gnupg.org           keyid 621CC013

-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to