Problems with GNUpg 1.2.2 on AIX 5.2.0 (ML 1)

Werner Koch wk at
Sun Aug 3 12:47:01 CEST 2003

On Sat, 2 Aug 2003 08:35:09 -0600 (MDT), Nelson H F Beebe said:

> Try using /dev/urandom instead.  /dev/random is cryptographically
> strong, and will not return data until sufficient entropy has been

GnuPG knows about this and uses boths devices depending on the purpose
of the required random.  We try to make sure that the GnuPG internal
random pool has been seeded with a sufficient ammount of strong
entropy (/dev/random) and in addition a certain amoount of this
entropy is required for key generation.  For other purposes the GnuPG
internal pool might be just seeded by a possible PRNG (/dev/urandom).

The bottom line is that one should not replace /dev/random by

If you don't want to generate keys, a workaround is to pre-create the
random-seed file (take 600 bytes random from somewhere).



Werner Koch                                      <wk at>
The GnuPG Experts                      
Free Software Foundation Europe	       

More information about the Gnupg-devel mailing list