On 13.08.2011 10:09, Kyle Hamilton wrote:

> See also http://egd.sourceforge.net/ (Entropy Gathering Daemon, written
> in perl)

EGD is meant for systems where the /dev/random is not
present/accessible.

Assuming the /dev/random takes the entropy from all sources
affecting the scheduling of processes such userspace solutions
simply can't return more entropy and using them only generates
a false sense of added security (by obscurity).

Trust your /dev/random and if there are possible attacks on it,
thwart them directly. If you think there is an entropy source
the /dev/random does not use, implement it and submit a patch
to your kernel maintainer. If this is not enough, use a hardware
source of randomness.

Regards
-- 
                                        Stano
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to