On Tue, 2001-08-21 at 14:31, David Wagner wrote:
> David Lang wrote:
> >so as I see this discussion it goes something like this.
> >
> >1. the entropy pool is not large enough on headless machines.
> >2. you don't want to use urandom as there are theoretical attacks against
> >it
>
> If that's the concern, then I'm glad to say that I have very reassuring
> news for you. No attacks are known on /dev/urandom, not even theoretical
> ones.
This is because there are no known attacks are SHA-1.
> (And no attack is known on SHA-1, not even a theoretical one.)
Right.
> (Don't confuse a remote risk that someone might discover a theoretical
> attack on SHA-1 with knowledge that we already know of a theoretical
> attack on SHA-1.)
Responding to David Lang, #1 is correct. On a headless or diskless
machine, the entropy pool can be very small. Net devices provide the
needed entropy.
Thus, since _you_ trust SHA-1, if you also feel the bits garnered from
your network interfaces is entropic, then the patch is useful for you.
If you don't, then don't enable it. But, since you trust SHA-1,
/dev/random is of no difference to you than /dev/urandom, so its no
difference :)
-- Robert M. Love rml at ufl.edu rml at tech9.net- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Thu Aug 23 2001 - 21:00:45 EST