[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Not enough entropy in RNG



In message <[🔎] 20020129061520.GC15966@mira.lan.galacticasoftware.com>it was written:
>On Tue, Jan 29, 2002 at 12:48:14AM -0500, Neal H Walfield wrote:
>> > Has anyone run into a "Not enough entropy in RNG" error when running
>> > ssh-keygen?
>> 
>> First, you need /dev/{u,}random (see
>> ftp://alpha.gnu.org/gnu/hurd/contrib/marcus/random-latest.tar.gz),
>> then, you need entropy.  The only way to give the random translator
>> entropy is to `feed' it.  There is no one currently doing this.
>
>I know that on the net I found a _real_ random number generator. It
>is measurements of some transition state in X element. Once data
>is sent to you, it is deleted from their server. Thus, you get
>true random data and not some psudo-random stuff :)
>
>- Adam
>
>PS. One person can only get about 1k of randomness per day so they
>don't run out :)

Well theres also random.org which provides wveb and corba based true random
data from atmospheric noise.

The problemwith these sources is that they are very insecure for security purposes
because anyone sniffing your network has the random btyes you started with. IF you are
generating the entropy internally to the computer that you are using them on there is
a much lower chance that they can be compromised. 

as always,
nick rusnov
nick@fargus.net



Reply to: