Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

7
  • Did you see this in /proc for getting the size of the entropy pool? /proc/sys/kernel/random/entropy_avail. Commented Mar 1, 2014 at 4:16
  • Also just curious, I've only typically seen /dev/urandom used (in security applications too), which would make your concern moot (I think). Gilles answer here kind of backs me up on this, unix.stackexchange.com/questions/32988/…. Just wondering if you were aware of this. So is /dev/random even needed here? Commented Mar 1, 2014 at 4:27
  • This looked related too: unix.stackexchange.com/questions/94206/… Commented Mar 1, 2014 at 4:40
  • @slm [comment 1] "I have written a simple script which shows the users the current size of the entropy pool" What you you think where I get this data from? [comment 2] GnuPG makes heavy use of /dev/random. You don't even need strace to find that out: GnuPG often blocks (on systems with little entropy at least) and it would not block it it used /dev/urandom. They use urandom, too, but for less important data only. These people have a very clear attitude towards entropy quality... Gilles' answers don't help me. Commented Mar 1, 2014 at 13:17
  • 1
    Fair enough, just directing these as potential leads for you. Will keep looking 8-) Commented Mar 1, 2014 at 13:26