From owner-freebsd-bugs@FreeBSD.ORG Fri Apr 18 22:00:02 2014 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9B9C773E for ; Fri, 18 Apr 2014 22:00:02 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8905814BE for ; Fri, 18 Apr 2014 22:00:02 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.8/8.14.8) with ESMTP id s3IM02Ds010777 for ; Fri, 18 Apr 2014 22:00:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s3IM02PV010776; Fri, 18 Apr 2014 22:00:02 GMT (envelope-from gnats) Date: Fri, 18 Apr 2014 22:00:02 GMT Message-Id: <201404182200.s3IM02PV010776@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Eitan Adler Subject: Re: bin/188745: FreeBSD base OpenSSL puts private keys to RNG seeds X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: Eitan Adler List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 18 Apr 2014 22:00:02 -0000 The following reply was made to PR bin/188745; it has been noted by GNATS. From: Eitan Adler To: Kenji Rikitake Cc: bug-followup Subject: Re: bin/188745: FreeBSD base OpenSSL puts private keys to RNG seeds Date: Fri, 18 Apr 2014 14:58:17 -0700 On 17 April 2014 20:51, Kenji Rikitake wrote: >>Environment: > FreeBSD minimax.priv.k2r.org 10.0-STABLE FreeBSD 10.0-STABLE #33 r264285: Wed Apr 9 09:25:02 JST 2014 root@minimax.priv.k2r.org:/usr/obj/usr/src/sys/K2RKERNEL amd64 >>Description: > OpenBSD devs report OpenSSL puts RSA private keys as they are for seeding the PRNG. See http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf for the details. > > On 10.0-STABLE, I've found the same practice under /usr/src/crypto/openssl/crypto at: Please see: http://blog.ngas.ch/archives/2014/04/17/what_is_this_private_key_doing_in_my_random_pool/index.html In particular: "So the patch which was committed by the OpenBSD people actually has the potential to weaken the entropy of the OpenSSL random pool, but it was never a security or privacy concern," -- Eitan Adler