Gentoo Archives: gentoo-hardened

From: Ed W <lists@××××××××××.com>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Bought an "entropy-key" - very happy
Date: Thu, 25 Mar 2010 20:17:37
Message-Id: 4BABC4C8.2080603@wildgooses.com
In Reply to: Re: [gentoo-hardened] Bought an "entropy-key" - very happy by pageexec@freemail.hu
1 On 25/03/2010 17:50, pageexec@××××××××.hu wrote:
2 > On 25 Mar 2010 at 13:10, Rob Kendrick wrote:
3 >
4 >
5 >> it goes to extraordinary lengths to make sure the entropy that is
6 >> injected into your pool can't be sniffed before it gets there,
7 >>
8 > out of curiosity, what's that mean exactly?
9 >
10 >
11
12 I believe that the random numbers are encrypted out of the device? I
13 say that because when you start up the userspace daemon you tell it a
14 long random number supplied with the device. I assume this is designed
15 to make sure that some local process can't sniff the entropy (over the
16 USB bus, or whatever) before it's added to the kernel pool?
17
18 Although this seems like a basic feature for an entropy source, it
19 wasn't particularly a feature I was looking for. From my point of view
20 it just seemed like a cheap plentiful entropy source which works pretty
21 much out of the box just by plugging in...
22
23 Cheers
24
25 Ed W

Replies

Subject Author
Re: [gentoo-hardened] Bought an "entropy-key" - very happy Rob Kendrick <rjek@××××.com>