diff options
author | Laurent Bercot <ska-skaware@skarnet.org> | 2020-10-04 17:48:50 +0000 |
---|---|---|
committer | Laurent Bercot <ska-skaware@skarnet.org> | 2020-10-04 17:48:50 +0000 |
commit | da9d87dbaed4893cc2fcf364f73b8a3da99875ba (patch) | |
tree | 40786987050bf7b5c6fe2d98605b96179a5f05e3 /doc/s6-fillurandompool.html | |
parent | 8d0b28b3f5df93979c253a6760fc925f7cc4e772 (diff) | |
download | s6-linux-utils-da9d87dbaed4893cc2fcf364f73b8a3da99875ba.tar.xz |
doc: fix URLs
Diffstat (limited to 'doc/s6-fillurandompool.html')
-rw-r--r-- | doc/s6-fillurandompool.html | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/s6-fillurandompool.html b/doc/s6-fillurandompool.html index 9be985e..c07b0f4 100644 --- a/doc/s6-fillurandompool.html +++ b/doc/s6-fillurandompool.html @@ -40,13 +40,13 @@ Reading from <tt>/dev/random</tt> blocks when its entropy pool is not full enough, so it will never return weak random data. (Reading from <tt>/dev/random</tt> is overkill anyway, and -<a href="http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/">you +<a href="https://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/">you should not be doing it.</a>) </p> <p> However, reading from <tt>/dev/urandom</tt> (which -<a href="http://www.2uo.de/myths-about-urandom/">you should be doing</a>) +<a href="https://www.2uo.de/myths-about-urandom/">you should be doing</a>) will not block, even though the entropy pool may not have been initialized yet. That's the only insecure thing about it: at boot time, <tt>/dev/urandom</tt> may return weak random data, until its entropy @@ -66,7 +66,7 @@ random data, until the machine shuts down. <ul> <li> <tt>s6-fillurandompool</tt> will only work on a Linux kernel version 3.17 or later: this is when the -<a href="http://man7.org/linux/man-pages/man2/getrandom.2.html"><tt>getrandom()</tt></a> +<a href="https://man7.org/linux/man-pages/man2/getrandom.2.html"><tt>getrandom()</tt></a> system call, which it internally uses, has been implemented. </li> </ul> |