Extremely Slow Ed25519 Key Generation (Entropy Source?)
    Daniel Kahn Gillmor 
    dkg at fifthhorseman.net
       
    Sat Sep 30 21:55:16 CEST 2017
    
    
  
On Thu 2017-09-28 14:26:26 +0200, Werner Koch wrote:
> Put this into /etc/gcrypt/random.conf
 […]
> # Only use /dev/urandom
> only-urandom
> --8<---------------cut here---------------end--------------->8---
>
> That is in general okay because on modern kernels we anyway use the
> getrandom call and thus we are eben safe at boot time.
If we're using getrandom() with the appropriate semantics, shouldn't
this be the default?  As random(4) says:
       The  /dev/random  interface  is  considered  a  legacy  interface,  and
       /dev/urandom is preferred and sufficient in all  use  cases,  with  the
       exception  of  applications  which require randomness during early boot
       time; for  these  applications,  getrandom(2)  must  be  used  instead,
       because it will block until the entropy pool is initialized.
What is the right default here?
    --dkg
    
    
More information about the Gcrypt-devel
mailing list