On 04/05/2018 04:06, Paul Wise wrote:
On Thu, May 3, 2018 at 4:53 PM, richard lucassen wrote:There is also an big increase in time before random is initialized:...One of the consequences is that openntpd (or a program like rdate) hangs until the crng is initialized.What do these two programs require entropy for?
security:Integrates the latest secure API advances from OpenBSD such as getentropy(2), arc4random(3) (a fail-safe CSRNG that works in chroot environments), and reallocarray(3) (an integer overflow-checking malloc/calloc/realloc replacement).[1]
you can read more detail on NTP RFC[2] Ciao Davide [1] http://www.openntpd.org/features.html [2] https://www.ietf.org/rfc/rfc1305.txt https://www.ietf.org/rfc/rfc5905.txt