A patch to Allow net devices to contribute to the kernel entropy pool aka netdev-random Newest version should always be available at /pub/linux/kernel/people/rml/netdev-random on your favorite kernel.org mirror. Also, http://tech9.net/rml/linux has information and links. This patch lets the user configure whether interrupt timings from network devices contribute to the kernel entropy pool (/dev/random). Currently, block devices and some other drivers feed the pool, although very few network devices do. This patch makes a user configurable policy out of the issue: either allow or disallow them all. Some users are on a headless or diskless system that generates very little entropy -- this patch provides a needed source. Other users fear that entropy from an open network is a security problem -- this patch will then make sure no network devices contribute to the pool. Note that without the patch, some network devices do. New versions of this patchset come in two pieces: netdev-random-core-rml-x.y.z-w.patch, which is the core support, revision w, for kernel x.y.z, and netdev-random-drivers-rml-x.y.z-w.patch which is the modified drivers. Old versions were available in the form netdev-random-rml-x.y.z-w.patch, where w was confusingly 1 for the core patch and 2 for the driver patch. Use: Patch the proper kernel with both patches. Enable CONFIG_NET_RANDOM in `Network Devices' to allow network devices to feed the pool. Disable said option to disallow contribution. Compile. Driver writers: Set the flag SA_NET_RANDOM in request_irq() in your network device. SA_NET_RANDOM defines to zero or SA_SAMPLE_RANDOM based on the value of CONFIG_NET_RANDOM. Help: Patches against new drivers are always welcome. Enjoy, Robert Love rml@tech9.net