1 |
On 25/03/2010 17:50, pageexec@××××××××.hu wrote: |
2 |
> On 25 Mar 2010 at 13:10, Rob Kendrick wrote: |
3 |
> |
4 |
> |
5 |
>> it goes to extraordinary lengths to make sure the entropy that is |
6 |
>> injected into your pool can't be sniffed before it gets there, |
7 |
>> |
8 |
> out of curiosity, what's that mean exactly? |
9 |
> |
10 |
> |
11 |
|
12 |
I believe that the random numbers are encrypted out of the device? I |
13 |
say that because when you start up the userspace daemon you tell it a |
14 |
long random number supplied with the device. I assume this is designed |
15 |
to make sure that some local process can't sniff the entropy (over the |
16 |
USB bus, or whatever) before it's added to the kernel pool? |
17 |
|
18 |
Although this seems like a basic feature for an entropy source, it |
19 |
wasn't particularly a feature I was looking for. From my point of view |
20 |
it just seemed like a cheap plentiful entropy source which works pretty |
21 |
much out of the box just by plugging in... |
22 |
|
23 |
Cheers |
24 |
|
25 |
Ed W |