From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759405AbYEPSXV (ORCPT ); Fri, 16 May 2008 14:23:21 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755368AbYEPSXJ (ORCPT ); Fri, 16 May 2008 14:23:09 -0400 Received: from earthlight.etchedpixels.co.uk ([81.2.110.250]:34924 "EHLO lxorguk.ukuu.org.uk" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754377AbYEPSXH (ORCPT ); Fri, 16 May 2008 14:23:07 -0400 Date: Fri, 16 May 2008 19:11:25 +0100 From: Alan Cox To: lsorense@csclub.uwaterloo.ca (Lennart Sorensen) Cc: Jeff Garzik , "Kok, Auke" , Rick Jones , "Brandeburg, Jesse" , Chris Peterson , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] drivers/net: remove network drivers' last few uses of IRQF_SAMPLE_RANDOM Message-ID: <20080516191125.46f59ad6@core> In-Reply-To: <20080516173610.GA27126@csclub.uwaterloo.ca> References: <20080515142154.0595e475@core> <36D9DB17C6DE9E40B059440DB8D95F52052D71BB@orsmsx418.amr.corp.intel.com> <482C7B18.6060003@garzik.org> <482C7E53.3050300@hp.com> <482C8184.2030906@garzik.org> <482C8550.5000909@intel.com> <482C8D4D.3040702@garzik.org> <20080516132107.GA11304@csclub.uwaterloo.ca> <20080516161029.44ded734@core> <20080516173610.GA27126@csclub.uwaterloo.ca> X-Mailer: Claws Mail 3.3.1 (GTK+ 2.12.5; x86_64-redhat-linux-gnu) Organization: Red Hat UK Cyf., Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SL4 1TE, Y Deyrnas Gyfunol. Cofrestrwyd yng Nghymru a Lloegr o'r rhif cofrestru 3798903 Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > So what is one to do if a few applications want to read from /dev/random > but you have no excellent source of entropy on the system? Wait > forever? Yes. If they don't need that level of security they can use /dev/urandom. Piping network randomness into /dev/urandom is probably quite sensible but not into /dev/random. Alan