> > Has anyone seen this before? Can we borrow some entropy from someone? > > I've never seen it occur, but the blocking is the designed behavior and the > reason why you'd use random instead of urandom. The idea is that an attacker > could suck all the entropy out of /dev/random, thus making the output of > /dev/urandom easier to predict.
Yeah, using /dev/urandom is only temporary. I guess we can try rebooting
the machine sometime soon; I hope that fixes it.
> I'd look for any processes with open file handles to /dev/random.
We killed the one process that was using it.
-Evan
--
/********************************************************************\
Evan McNabb: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
http://evan.mcnabbs.org
System Administrator, CS Department, BYU
GnuPG Fingerprint: 53B5 EDCA 5543 A27A E0E1 2B2F 6776 8F9C 6A35 6EA5
\********************************************************************/
pgp00000.pgp
Description: PGP signature
____________________ BYU Unix Users Group http://uug.byu.edu/ ___________________________________________________________________ List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
