Uses too much entropy (Debian Bug #343085)
n.mavrogiannopoulos at gmail.com
Fri Jan 4 12:55:48 CET 2008
> > A workaround might be to use the libgcrypt's random number process
> > feature which uses a single server process to feed other processes
> > with entropy (I've never worked with it so I don't know if it can be
> > used in that case). This might solve this issue.
> * /dev/(u)random is more difficult to subvert than a daemon.
> * The kernel has access to more sources of randomness.
I don't understand these comments. The libgcrypt's generator can be
used in a separate processes. It doesn't mean it gathers any entropy
except for using /dev/urandom as usual.
More information about the Gnutls-devel