Date: Tue, 18 Jul 2000 08:17:57 +0200 From: Mark Murray <mark@grondar.za> To: Poul-Henning Kamp <phk@critter.freebsd.dk> Cc: current@FreeBSD.ORG Subject: Re: randomdev entropy gathering is really weak Message-ID: <200007180617.IAA03375@grimreaper.grondar.za> In-Reply-To: <6765.963898605@critter.freebsd.dk> ; from Poul-Henning Kamp <phk@critter.freebsd.dk> "Tue, 18 Jul 2000 07:36:45 %2B0200." References: <6765.963898605@critter.freebsd.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
> People have tried for 30+ years to predict what a quartz xtal > will do next. Nobody expects any chance of success. Add to this > the need to predict the difference between one or more NTP servers > and your local qartz xtal and I think we can safely say "impossible". You can't predict this, but you can _measure_ it with a degree of accuracy. The attacker can use this accuracy to reduce the number of tries in his attack. > >I think we first need to figure out the security implications. > > I think the security implications of having no entropy are much > worse than having entropy which a truly superhuman *maybe* could > guess *some* of the bits in, are far worse. Yarrow addresses this problem; even if the attacker does manage to get the internal state, Yarrow will revover. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200007180617.IAA03375>