[3567] in Kerberos-V5-bugs
[krbdev.mit.edu #1233] need to disable /dev/random use for testing
daemon@ATHENA.MIT.EDU (Ken Raeburn via RT)
Tue Oct 29 20:18:18 2002
Message-Id: <rt-1233-3248.10.9671885611438@krbdev.mit.edu>
In-Reply-To: <rt-1233@krbdev.mit.edu>
From: "Ken Raeburn via RT" <rt-comment@krbdev.mit.edu>
Reply-To: rt-comment@krbdev.mit.edu
To: krb5-prs@mit.edu
Errors-To: krb5-bugs-admin@mit.edu
Date: Tue, 29 Oct 2002 20:17:19 -0500 (EST)
On relatively idle machines, nightly tests run via cron are failing
because kadmin takes too long to initialize at startup, because it
blocks reading from /dev/random. For testing purposes, we don't care
how good the random numbers are, as long as they're at least "sort of"
good; using /dev/urandom is more than adequate.
A new config file (krb5.conf probably) option to explicitly turn off
the use of /dev/random should be created. Probably using "insecure"
and "entropy" in the name, something like that. Whether the
application-level code or the crypto library code should act on it is
to be decided.
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
http://mailman.mit.edu/mailman/listinfo/krb5-bugs