[openssl-dev] Work on a new RNG for OpenSSL

Theodore Ts'o tytso at mit.edu
Wed Jun 28 02:41:10 UTC 2017


On Wed, Jun 28, 2017 at 11:41:11AM +1000, Peter Waltenberg wrote:
> And FYI. On systems not backed with hardware RNG's /dev/random is 
> extremely slow. 1-2 bytes/second is a DOS attack on it's own without any 
> other effort required.

Please, stop suggesting the use /dev/random.  The right answer is
/dev/urandom or getrandom(2).

						- Ted


More information about the openssl-dev mailing list