Announcement

Collapse
No announcement yet.

/dev/random Is More Like /dev/urandom With Linux 5.6

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #11
    Originally posted by uid313 View Post
    With I/O testing you can use /dev/random, you don't need /dev/urandom for that,
    You made a swap confusion:
    /dev/random - is the blocking one that will wait until there's enough entropy
    /dev/urandom - is the non-blocking that will always return, no matter the quality.

    And with regards with IO testing...

    Originally posted by uid313 View Post
    also there are many dedicated I/O testing utilities.
    ...there are tools, yes. Because often you don't even need randomness in the cryptographic sense. Usually noise is good enough.
    It might be a plain simple fast encryption stream with the seed used as a fixed password.
    Or it might even be some mathematical pseaudorandom number generator.

    Originally posted by uid313 View Post
    For password generation there are tools for that, also it is easy to write one in Python (or some other language).
    Tools: yes, if specially if you pick some well established and well understood standard. Though that is more difficult in modern languages that lack an actual standard library. (don't just "git clone as a submodule" any random snippet of code you're found).

    "Easy to write": And equaly easy to screw up. My opinion is if you're not fluent in security matters, better not to roll your own. Colin Pierceval can very easily invent his own brand new password hasher. Aiden Junior straight out of Python Coding Bootcamp shouldn't touch security matters, unles everything is thoroughly reviewed and tested by a group of experts.

    Comment


    • #12
      Originally posted by DrYak View Post
      Tools: yes, if specially if you pick some well established and well understood standard. Though that is more difficult in modern languages that lack an actual standard library. (don't just "git clone as a submodule" any random snippet of code you're found).
      I am not convinced that much in terms of entropy is needed for password generation.

      Comment


      • #13
        Originally posted by sandy8925 View Post

        Except when generating keys for encrypted partitions, SSL etc. In that case you'll need to use /dev/random or /dev/urandom directly in a shell command.
        I think the "openssl" tool can generate keys for you.

        Comment


        • #14
          Originally posted by uid313 View Post

          I think the "openssl" tool can generate keys for you.
          True, there's that option too. Arch WIki suggests
          Code:
          dd if=/dev/random of=/keyfile_path
          for key generation

          Comment


          • #15
            Originally posted by uid313 View Post
            I am not convinced that much in terms of entropy is needed for password generation.
            The point of generating password is the password must be hard to predict.
            A badly design password generator could have a big bias toward some feature (Ob. xkcd joke), vastly simplifying the brute forcing.

            Although it's not a bug in a password generator, but in a random generator, a bug in Debian's number generator to only have 2^15 different starting positions, vastly simplifying any brute force attempts.

            Comment

            Working...
            X