From owner-freebsd-security Tue May 4 10: 9:47 1999 Delivered-To: freebsd-security@freebsd.org Received: from smtp0.mindspring.com (smtp0.mindspring.com [207.69.200.30]) by hub.freebsd.org (Postfix) with ESMTP id 897D814C0F; Tue, 4 May 1999 10:09:42 -0700 (PDT) (envelope-from honig@sprynet.com) Received: from maryanne (user-38ldg75.dialup.mindspring.com [209.86.192.229]) by smtp0.mindspring.com (8.8.5/8.8.5) with SMTP id NAA29202; Tue, 4 May 1999 13:09:36 -0400 (EDT) Message-Id: <3.0.5.32.19990504100851.007f5820@m7.sprynet.com> X-Sender: honig@m7.sprynet.com X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32) Date: Tue, 04 May 1999 10:08:51 -0700 To: (Recipient list suppressed) From: David Honig Subject: BSD & /dev/random web page Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org I've posted a small collection of my BSD and crypto-randomness-related pages at http://www.geocities.com/SiliconValley/Code/4704/ This includes MUST code in C (and a PDF copy of Maurer's paper), How to instrument BSD with sysctl,How to Verify your IPsec, and studies of /dev/random. The site collects in a permenant place the hacks that I've posted in various fora. I've included a modified BSD random_machdep.c file on the web site which includes sysctl switches for various parts of the /dev/random system. With this, I've observed: By replacing the MD5 hash with an insecure version, (so you can 'see' into the random pool) you can monitor, in real-time, the entropy of your random pool ("cat /dev/urandom | uliscan") and see the effect of various interrupts as they temporarily boost the entropy. This study is in progress. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message