Subject: Re: replace kernel random number function
To: Hubert Feyrer <hubert.feyrer@informatik.fh-regensburg.de>
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
List: tech-kern
Date: 10/22/2000 22:58:19
>>>>> "Hubert" == Hubert Feyrer <hubert.feyrer@informatik.fh-regensburg.de> writes:
Hubert> On Sat, 21 Oct 2000, Jun-ichiro itojun Hagino wrote:
>> i plan to replace kernel random(9) with libc random(3) code,
>> or arc4random. any comments?
>>
>> current random(9) is too weak, and allows security threat like we saw
>> with TCP ISS guessing. libc random(3) code looks enough strong for
>> polinomial random number generator.
Hubert> Will that give us random(3) -> random(2)?
It might be nice for applications that want randomness to get it via a
system call rather via /dev/urandom, but I'm not sure that a system call is
better than a device.
It does have the advantage that there is additional element of
non-determinism due to multiple users of the stream.
It could give us non_deterministically_pseudo_random(2), but random(3),
while a PRNG, is deterministic given the same seed. This is pretty important
when debugging applications, and in the case of some simulations and
monte-carlo type processes, being able to repeat the results.
:!mcr!: | Solidum Systems Corporation, http://www.solidum.com
Michael Richardson | now at 1575 Carling Avenue...
Personal: mcr@sandelman.ottawa.on.ca. PGP key available.
Corporate: <A HREF="mailto:mcr@solidum.com">mcr@solidum.com</A>.