{"id":1163,"date":"2008-09-23T14:47:43","date_gmt":"2008-09-23T18:47:43","guid":{"rendered":"http:\/\/blogs.n1zyy.com\/n1zyy\/?p=1163"},"modified":"2008-09-23T14:47:43","modified_gmt":"2008-09-23T18:47:43","slug":"devrandom","status":"publish","type":"post","link":"https:\/\/blogs.n1zyy.com\/n1zyy\/2008\/09\/23\/devrandom\/","title":{"rendered":"\/dev\/*random"},"content":{"rendered":"<p>I thought I&#8217;d share my latest discovery. Linux has two &#8220;random number generators&#8221; as pseudo-hardware devices (that is, they&#8217;re in \/dev, but aren&#8217;t actual hardware, much like \/dev\/null.) They&#8217;re called \/dev\/random and \/dev\/urandom. I never knew, or even thought much about, the difference.<\/p>\n<p>\/dev\/random will &#8220;block&#8221; if it runs <a href=\"http:\/\/everything2.com\/e2node\/entropy%2520pool\">out of entropy<\/a>. \/dev\/urandom is less secure in that it will keep serving data, but it will be from a less-secure pseudo-random series.<\/p>\n<p>The difference is quite useful. For example, when encrypting something, it&#8217;s important to have &#8220;good&#8221; random numbers, hence \/dev\/random is indicated. On the other hand, the caching resolver I&#8217;m running (localish-only) on this server uses \/dev\/urandom: randomness <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/800113\">prevents cache poisoning<\/a>, but I really don&#8217;t want my DNS queries waiting for the &#8220;entropy pool&#8221; to get refilled.<\/p>\n<p>As an aside, <a href=\"https:\/\/www.dns-oarc.net\/oarc\/services\/dnsentropy\">some tools<\/a> to measure the effective randomness of your nameserver&#8217;s ports. Comcast, pretty impressively, ranks &#8220;Great&#8221; on the tests, as do the various caching nameservers in use on our webserver.<\/p>","protected":false},"excerpt":{"rendered":"<p>I thought I&#8217;d share my latest discovery. Linux has two &#8220;random number generators&#8221; as pseudo-hardware devices (that is, they&#8217;re in \/dev, but aren&#8217;t actual hardware, much like \/dev\/null.) They&#8217;re called \/dev\/random and \/dev\/urandom. I never knew, or even thought much &hellip; <a href=\"https:\/\/blogs.n1zyy.com\/n1zyy\/2008\/09\/23\/devrandom\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1163","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/1163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/comments?post=1163"}],"version-history":[{"count":0,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/1163\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/media?parent=1163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/categories?post=1163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/tags?post=1163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}