Don't mess with my random numbers
Don't mess with my random numbers
Posted Oct 25, 2015 5:29 UTC (Sun) by malor (guest, #2973)In reply to: Don't mess with my random numbers by abatters
Parent article: Other approaches to random number scalability
I presently use urandom for that, which I have just learned today is something I'm not supposed to be doing. That's fine, but I'd rather see a facility for doing what I'm doing (using a flood of semi-random data as a drive wiper), rather than seeing urandom weakened in any way.
Yes, I'm a urandom abuser, and probably deserve a hearty finger shake and a tsk or two, but I think trying to defend against scurrilous people like me, by changing the quality of the bits provided, could be a really severe hidden issue. People truly depend on that stuff, and it's quite possible that predictable output from /dev/urandom could end up killing someone. No hyperbole there.... if a repressive government known for mass surveillance is able to break into privileged communications that depended on the strength of /dev/urandom, both parties could be executed.
Further, it's going to be real hard to test from outside, and as a user of bits, you'd want some kind of signal that you were no longer getting ones with the same guarantee anymore. I don't even know how you'd do that. And writing test cases to make sure that it was doing what it was supposed to do, under all circumstances, would be very hard, and testing the heuristic 'only punish abusers' code would be almost impossible.
/dev/urandom is understood to not be as good as /dev/random, and people aren't *supposed* to use it for really important stuff, but they might be doing it anyway. I'd say preserving existing guarantees is probably more important than scalability. Rather, switch jerks like me to the ChaCha20 cipher with /dev/frandom. I'd be perfectly happy to switch (and could probably wipe drives a fair bit faster, to boot.)
That just seems safest on every front. The random pools are NOT things to screw around with lightly.