Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 04 May 1999 10:08:51 -0700
From:      David Honig <honig@sprynet.com>
To:        (Recipient list suppressed)
Subject:   BSD & /dev/random web page
Message-ID:  <3.0.5.32.19990504100851.007f5820@m7.sprynet.com>

next in thread | raw e-mail | index | archive | help

I've posted a small collection of my BSD and 
crypto-randomness-related pages at
http://www.geocities.com/SiliconValley/Code/4704/

This includes MUST code in C (and a PDF copy of Maurer's paper), How to
instrument BSD with sysctl,How to Verify your IPsec, and studies of
/dev/random.  The site collects in a permenant place the hacks 
that I've posted in various fora.  

I've included a modified BSD random_machdep.c file on the web site
which includes  sysctl  switches for various parts of
the /dev/random system.  With this, I've observed: 

By replacing the MD5 hash with an insecure version, 
(so you can 'see' into the random pool)
you can monitor, in real-time, the entropy of your
random pool ("cat /dev/urandom | uliscan")
and see the effect of various interrupts
as they temporarily boost the entropy.  This study is
in progress.










  






To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.19990504100851.007f5820>