[Beowulf] /dev/random entropy on stateless/headless nodes

Stuart Barkley stuartb at 4gh.net
Fri Feb 25 15:08:09 PST 2011


We have a couple of clusters with headless, diskless and stateless
nodes using CentOS 5.  One of our users just ran onto a problem with
/dev/random blocking due to the lack of entropy.

I had the user change the program to use /dev/urandom and this has
handled the immediate problem.

/proc/sys/kernel/random/entropy_avail shows 0 across the compute
nodes even just after boot.

It appears that our Ethernet and Infiniband drivers don't add any
entropy to the random pool.

hw_random/intel-rng doesn't seem to work on our systems.

Some questions:

Do others have this problem?  What do you do?

Do you just refer users to /dev/urandom?

Do you modify network drivers to introduce entropy?

Are there other suggested methods of adding entropy to /dev/random?

Are there ways to introduce entropy from the random number generator
on some Intel systems?  Did Intel remove this from more recent chips?

How reliable is /dev/urandom without initial entropy?  We boot from
stateless disk images and don't carry any entropy over from previous
boots.  /dev/urandom appears to be different across several servers
just after boot, but I have not found any other initialization of the
entropy pool.  I haven't checked that single systems get different
results on different boots.  I'm concerned about users getting poor
random numbers from what should be good sources.

Thanks for any suggestions,
Stuart Barkley
-- 
I've never been lost; I was once bewildered for three days, but never lost!
                                        --  Daniel Boone



More information about the Beowulf mailing list