sks using dev/random

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

sks using dev/random

Peter Palfrader-2
My box was getting a little low on entropy sometimes, so I wondered
which applications used the random devices.

I found out that sks has dev/random open.  I guess there's no good
reason for sks to require that strong randomness, is there?  At least
urandom should be used.  Or do I miss something?

weasel@asteria:~$ sudo lsof -n | grep random
sks        1314       debian-sks    3r      CHR        1,8               1048810 /dev/random
sks        1316       debian-sks    3r      CHR        1,8               1048810 /dev/random

Cheers,
Peter
--
 PGP signed and encrypted  |  .''`.  ** Debian GNU/Linux **
    messages preferred.    | : :' :      The  universal
                           | `. `'      Operating System
 http://www.palfrader.org/ |   `-    http://www.debian.org/


_______________________________________________
Sks-devel mailing list
[hidden email]
http://lists.nongnu.org/mailman/listinfo/sks-devel
Reply | Threaded
Open this post in threaded view
|

Re: sks using dev/random

Yaron Minsky-2
This appears to come from cryptokit, xavier leroy's ocaml crypto
library.  I'm pretty sure the RNG is actually used, so it's just an
open file, and it's at least not obvious to me that that sucks out
randomness from /dev/random.  (maybe it does on initialization, if
there is some prefetching from /dev/random at the OS level when it's
opened.  But I can't imagine there's any ongoing drain.)

On 10/6/05, Peter Palfrader <[hidden email]> wrote:

> My box was getting a little low on entropy sometimes, so I wondered
> which applications used the random devices.
>
> I found out that sks has dev/random open.  I guess there's no good
> reason for sks to require that strong randomness, is there?  At least
> urandom should be used.  Or do I miss something?
>
> weasel@asteria:~$ sudo lsof -n | grep random
> sks        1314       debian-sks    3r      CHR        1,8               1048810 /dev/random
> sks        1316       debian-sks    3r      CHR        1,8               1048810 /dev/random
>
> Cheers,
> Peter
> --
>  PGP signed and encrypted  |  .''`.  ** Debian GNU/Linux **
>     messages preferred.    | : :' :      The  universal
>                            | `. `'      Operating System
>  http://www.palfrader.org/ |   `-    http://www.debian.org/
>
>
> _______________________________________________
> Sks-devel mailing list
> [hidden email]
> http://lists.nongnu.org/mailman/listinfo/sks-devel
>


_______________________________________________
Sks-devel mailing list
[hidden email]
http://lists.nongnu.org/mailman/listinfo/sks-devel
Reply | Threaded
Open this post in threaded view
|

Re: sks using dev/random

Peter Palfrader-2
On Thu, 06 Oct 2005, Yaron M. Minsky wrote:

> This appears to come from cryptokit, xavier leroy's ocaml crypto
> library.  I'm pretty sure the RNG is actually used, so it's just an
> open file, and it's at least not obvious to me that that sucks out
> randomness from /dev/random.  (maybe it does on initialization, if
> there is some prefetching from /dev/random at the OS level when it's
> opened.  But I can't imagine there's any ongoing drain.)

Ok, thanks.

--
 PGP signed and encrypted  |  .''`.  ** Debian GNU/Linux **
    messages preferred.    | : :' :      The  universal
                           | `. `'      Operating System
 http://www.palfrader.org/ |   `-    http://www.debian.org/


_______________________________________________
Sks-devel mailing list
[hidden email]
http://lists.nongnu.org/mailman/listinfo/sks-devel