Almost all modern Linux systems use ASLR and stack protections that need a small amount of entropy per process. Since urandom always remixes, it doesn't strictly run out, but the entropy drops. In theory, this isn't a problem since the state of the pool cannot be extracted, guessed, or replayed.
It would be nice to have another entropy pool in the kernel for these things, like Schneier's pRNG from the Practical Cryptography book.
AT_RANDOM is used by default in the Linux kernel since 2.6.29:
http:// git.kernel. org/?p= linux/kernel/ git/torvalds/ linux-2. 6.git;a= commitdiff; h=f06295b44c296 c8fb08823a31184 68ae343b60f2
Almost all modern Linux systems use ASLR and stack protections that need a small amount of entropy per process. Since urandom always remixes, it doesn't strictly run out, but the entropy drops. In theory, this isn't a problem since the state of the pool cannot be extracted, guessed, or replayed.
It would be nice to have another entropy pool in the kernel for these things, like Schneier's pRNG from the Practical Cryptography book.