Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Jul 2000 12:55:02 -0700
From:      "Andrey A. Chernov" <ache@freebsd.org>
To:        Mark Murray <mark@grondar.za>
Cc:        Bill Fumerola <billf@chimesnet.com>, current@FreeBSD.ORG
Subject:   Re: randomdev entropy gathering is really weak
Message-ID:  <20000716125502.B89979@freebsd.org>
In-Reply-To: <200007161942.VAA04096@grimreaper.grondar.za>; from mark@grondar.za on Sun, Jul 16, 2000 at 09:42:29PM %2B0200
References:  <20000716152631.G51462@jade.chc-chimes.com> <200007161942.VAA04096@grimreaper.grondar.za>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jul 16, 2000 at 09:42:29PM +0200, Mark Murray wrote:
> > On Sun, Jul 16, 2000 at 08:26:44PM +0200, Mark Murray wrote:
> > 
> > > Gotcha - fix coming; I need to stash some randomness at shutdown time, and
> > > use that to reseed the RNG at reboot time.
> > 
> > ... and for installations where ssh-keygen is run the first time
> > the system boots?
> 
> The situation is _worse_; the entropy is minimal, and is _very_ attackable.

What's wrong about timers for enthropy (I mean high resolution ones)?
Really we need only few bytes of enthropy and can use them to seed RNG for the 
first time if no true randomness available. To be joking: MD5 of kernel module 
can help too :-)

-- 
Andrey A. Chernov
<ache@nagual.pp.ru>
http://ache.pp.ru/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000716125502.B89979>