Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 19 Aug 2002 12:26:49 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 19 Aug 2002 12:26:49 -0400 Received: from mailout01.sul.t-online.com ([194.25.134.80]:15286 "EHLO mailout01.sul.t-online.com") by vger.kernel.org with ESMTP id convert rfc822-to-8bit; Mon, 19 Aug 2002 12:26:48 -0400 Content-Type: text/plain; charset=US-ASCII From: Oliver Neukum To: Marco Colombo Subject: Re: [PATCH] (0/4) Entropy accounting fixes Date: Mon, 19 Aug 2002 18:29:52 +0200 User-Agent: KMail/1.4.1 Cc: linux-kernel References: In-Reply-To: MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Message-Id: <200208191829.52241.oliver@neukum.name> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 674 Lines: 21 > Not at all. Let me (one process) read 1MB from /dev/urandom, > and analyze it. If I can break SHA-1, I'm able to predict *future* > /dev/urandom output, expecially if I keep draining bits from > /dev/random. True, but you cannot predict which task will read which part of the output of urandom. Also not all attackers can read from urandom. If you really care, you might implement entropy pools per user. Regards Oliver - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/