> > Has anyone seen this before? Can we borrow some entropy from someone?
> 
> I've never seen it occur, but the blocking is the designed behavior and the
> reason why you'd use random instead of urandom.  The idea is that an attacker
> could suck all the entropy out of /dev/random, thus making the output of
> /dev/urandom easier to predict.

Yeah, using /dev/urandom is only temporary. I guess we can try rebooting
the machine sometime soon; I hope that fixes it.

> I'd look for any processes with open file handles to /dev/random.

We killed the one process that was using it.

-Evan

-- 
/********************************************************************\
       Evan McNabb: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
                     http://evan.mcnabbs.org
             System Administrator, CS Department, BYU
 GnuPG Fingerprint: 53B5 EDCA 5543 A27A E0E1 2B2F 6776 8F9C 6A35 6EA5
\********************************************************************/

Attachment: pgp00000.pgp
Description: PGP signature

____________________
BYU Unix Users Group 
http://uug.byu.edu/ 
___________________________________________________________________
List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to