[8053] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Lots of random numbers

daemon@ATHENA.MIT.EDU (Rich Salz)
Thu Nov 16 15:26:46 2000

Message-ID: <3A135259.A07F409F@caveosystems.com>
Date: Wed, 15 Nov 2000 22:19:53 -0500
From: Rich Salz <rsalz@caveosystems.com>
MIME-Version: 1.0
To: cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

I'm putting together a system that might need to generate thousands of RSA
keypairs per day, using OpenSSL on a "handful" of Linux machines.  What do
folks think of the following: take one machine and dedicate it as an entropy
source. After 'n' seconds turn the network card into promiscuous mode, scoop
up packets and hash them, dump them into the entropy pool. Do this for 'm'
seconds, then go back to sleep for awhile.  The sleep and wake times are
random numbers.  Other systems on the newtwork periodically make an SSL
connection to the entropy box, read bytes, and dump it into their /dev/random
device.

Is this a cute hack, pointless, or a good idea?
	/r$


home help back first fref pref prev next nref lref last post