From owner-freebsd-hackers@FreeBSD.ORG Sun Apr 20 18:02:00 2008 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2BDC7106566B for ; Sun, 20 Apr 2008 18:02:00 +0000 (UTC) (envelope-from fbsd06+VF=498723de@mlists.homeunix.com) Received: from turtle-out.mxes.net (turtle-out.mxes.net [216.86.168.191]) by mx1.freebsd.org (Postfix) with ESMTP id 0270E8FC13 for ; Sun, 20 Apr 2008 18:01:59 +0000 (UTC) (envelope-from fbsd06+VF=498723de@mlists.homeunix.com) Received: from mxout-03.mxes.net (mxout-03.mxes.net [216.86.168.178]) by turtle-in.mxes.net (Postfix) with ESMTP id 334A4163F6C for ; Sun, 20 Apr 2008 13:31:40 -0400 (EDT) Received: from gumby.homeunix.com. (unknown [87.81.140.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTP id AF8FD23E3F6 for ; Sun, 20 Apr 2008 13:31:38 -0400 (EDT) Date: Sun, 20 Apr 2008 18:31:35 +0100 From: RW To: freebsd-hackers@freebsd.org Message-ID: <20080420183135.78b8c710@gumby.homeunix.com.> In-Reply-To: References: <20080419175655.51a37bb2@gumby.homeunix.com.> X-Mailer: Claws Mail 3.3.1 (GTK+ 2.12.9; i386-portbld-freebsd7.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Re: Yarrow's Counter X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 Apr 2008 18:02:00 -0000 On Sat, 19 Apr 2008 23:30:23 +0400 Eygene Ryabinkin wrote: > I would not do it without consultations with Yarrow's creators: OK, I didn't realise it was actually specified, I thought it an implementation detail. > this modification seems not to help anything, It possibly doesn't help with an attack against Yarrow itself, but it means that 512 bits of entropy, rather than 256 bits, can be read-out from /dev/random.