SteveG wrote:
Nope, that's not how it works. /dev/urandom always provides values from a psuedo-random number generator. It does, however, get the seed for the PRNG from the true entropy pool, and, IIRC, occasionally re-seeds, depending on how heavily it's used. What I don't remember is whether or not kernal reads from the entropy pool directory or via the character device, and if it does from the character devices, whether it actually opens /dev/random or just c1,8 directly.
Cool, thanks for chiming in. Yeah, as I said, my understanding is sub-par, and apparently wrong!

oh well, but now I know. thanks.
SteveG wrote:
As for whether or not the PRNG is "good enough", it depends on your use. But that's why I suggested that using it to generate keys that require long-term security was not a good idea.
Well, the way its working on my system, (and a few others that have posted here), there is no option to use /dev/random. Believe me, I'd prefer it, but nothing I do has allowed me to keep entropy stocked for longer than 5 minutes, and I can't find anything on the Net to help. oh well... so much for security.

(actually, I feel quite safe enough using urandom all the time, from what I've read it is less safe but only theoretically so, and if it were cracked, you would have more issues than just your keys being susceptable)...
SteveG wrote:
Are the accounting modules availabie in the Linode kernels? If so, you can enable accouting and (I think) track which processes are opening /dev/random and sucking down your entropy pool.
I don't know. I am rather new to Linux. I'm a fast learner (I think

) but haven't even started to think about the kernel.

I wouldn't know what to do here without some help, so any suggestions would be more than welcome!
thanks again for your helpful post,
-j