mailing list archives
From: Ben Laurie <ben () links org>
Date: Mon, 20 Aug 2012 10:16:35 +0100
On Sun, Aug 19, 2012 at 11:12 PM, Dan Kaminsky <dan () doxpara com> wrote:
On Sun, Aug 19, 2012 at 3:03 PM, Ben Laurie <ben () links org> wrote:
On Sun, Aug 19, 2012 at 9:28 PM, Dan Kaminsky <dan () doxpara com> wrote:
On Sun, Aug 19, 2012 at 10:13 AM, Ben Laurie <ben () links org> wrote:
On Sun, Aug 19, 2012 at 5:42 PM, Dan Kaminsky <dan () doxpara com> wrote:
entropy gathering has gotten *worse* (via abandonment of interrupts),
Entropy gathering in _one particular OS_. Credit where its due, please.
My understanding is that bad keys were detected on more than just Linux,
which implies starvation on everything on everything not out of Redmond.
What interesting approaches are you aware of that deserve credit? Not a
rhetorical question, I'm genuinely curious.
I was referring to the abandonment of interrupts in Linux. You think
that other OSes have got worse at entropy gathering? And when did
"more than Linux" start implying "not Windows"?
My assumption is that the other Unixes weren't looking at interrupt timing
to begin with, i.e. they've always been as starved for entropy as Linux
Well, you know what they say about assumptions.
That being said, does VXWorks even *have* an OS provided
strong random number generator?
Don't know, don't care.
Windows has CryptGenRandom, which AFAIK doesn't block, and survives
everything but VM suspend/restore.
FreeBSD also doesn't block.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/