Skip to main content
Fixed link and apparent typo (“an” → “and”); formatted man page.
Source Link

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data anand relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentationthe Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

-W n, --fill-watermark=nnn
      Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048).  Setting this too high will cause rngd to dominate the contents of the entropy pool.  Low values will hurt system performance during entropy starves.  Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are here  are here.

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data an relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are here  

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data and relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn

      Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048).  Setting this too high will cause rngd to dominate the contents of the entropy pool.  Low values will hurt system performance during entropy starves.  Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are here.

Removed 'edit' from the cited link. The link does not open as expected with the 'edit' verb. The nbsp was added so the edit could be submitted.
Source Link

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data an relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are hereare here  

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data an relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are here

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data an relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are here  

Source Link
Craig Hicks
  • 756
  • 8
  • 14

I would guess there is threshold at which the device changes (weakens?) the algorithm for producing "random" data so that you don't run out completely. Namely, skimping on "real" random data an relying on a CSPNRG instead.

I just asked a related question and then found the answer on the rngd man page:

The rnd-tools service invokes the program /usr/sbin/rngd. Looking that in up the Ubuntu documentation it can be seen to have a parameter:

-W n, --fill-watermark=nnn Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).

My question/answer are here