Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:83827 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 45606 invoked from network); 25 Feb 2015 21:33:29 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 25 Feb 2015 21:33:29 -0000 Authentication-Results: pb1.pair.com smtp.mail=fsb@thefsb.org; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=fsb@thefsb.org; sender-id=pass Received-SPF: pass (pb1.pair.com: domain thefsb.org designates 173.203.187.115 as permitted sender) X-PHP-List-Original-Sender: fsb@thefsb.org X-Host-Fingerprint: 173.203.187.115 smtp115.iad3a.emailsrvr.com Linux 2.6 Received: from [173.203.187.115] ([173.203.187.115:45058] helo=smtp115.iad3a.emailsrvr.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 60/22-34010-6AF3EE45 for ; Wed, 25 Feb 2015 16:33:27 -0500 Received: from smtp31.relay.iad3a.emailsrvr.com (localhost.localdomain [127.0.0.1]) by smtp31.relay.iad3a.emailsrvr.com (SMTP Server) with ESMTP id E4DD53804C8; Wed, 25 Feb 2015 16:33:23 -0500 (EST) Received: by smtp31.relay.iad3a.emailsrvr.com (Authenticated sender: fsb-AT-thefsb.org) with ESMTPSA id 4483A3804C3; Wed, 25 Feb 2015 16:33:23 -0500 (EST) X-Sender-Id: fsb@thefsb.org Received: from [10.0.1.2] ([UNAVAILABLE]. [73.4.147.142]) (using TLSv1 with cipher DES-CBC3-SHA) by 0.0.0.0:465 (trex/5.4.2); Wed, 25 Feb 2015 21:33:23 GMT User-Agent: Microsoft-MacOutlook/14.4.8.150116 Date: Wed, 25 Feb 2015 16:33:19 -0500 To: Stanislav Malyshev , php-internals Message-ID: Thread-Topic: [PHP-DEV] [RFC] [DISCUSSION] Reliable user-land CSPRNG References: <54EE2F62.4020106@gmail.com> In-Reply-To: <54EE2F62.4020106@gmail.com> Mime-version: 1.0 Content-type: text/plain; charset="UTF-8" Content-transfer-encoding: 7bit Subject: Re: [PHP-DEV] [RFC] [DISCUSSION] Reliable user-land CSPRNG From: fsb@thefsb.org (Tom Worster) On 2/25/15, 3:24 PM, "Stanislav Malyshev" wrote: >Good summary read on the topic: http://www.2uo.de/myths-about-urandom/ >TLDR: it's ok to use /dev/urandom. Yes! Thanks for the link. Much shorter but with pretty much the same message, I like: http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/ The Linux RNG design and especially the urandom(4) man page has caused a lot of trouble. I wonder how many more years before we can put it behind us. Tom