Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Jul 2000 08:17:57 +0200
From:      Mark Murray <mark@grondar.za>
To:        Poul-Henning Kamp <phk@critter.freebsd.dk>
Cc:        current@FreeBSD.ORG
Subject:   Re: randomdev entropy gathering is really weak 
Message-ID:  <200007180617.IAA03375@grimreaper.grondar.za>
In-Reply-To: <6765.963898605@critter.freebsd.dk> ; from Poul-Henning Kamp <phk@critter.freebsd.dk>  "Tue, 18 Jul 2000 07:36:45 %2B0200."
References:  <6765.963898605@critter.freebsd.dk> 

next in thread | previous in thread | raw e-mail | index | archive | help
> People have tried for 30+ years to predict what a quartz xtal
> will do next.  Nobody expects any chance of success.  Add to this
> the need to predict the difference between one or more NTP servers
> and your local qartz xtal and I think we can safely say "impossible".

You can't predict this, but you can _measure_ it with a degree of
accuracy. The attacker can use this accuracy to reduce the number
of tries in his attack.

> >I think we first need to figure out the security implications.
> 
> I think the security implications of having no entropy are much
> worse than having entropy which a truly superhuman *maybe* could
> guess *some* of the bits in, are far worse.

Yarrow addresses this problem; even if the attacker does manage to
get the internal state, Yarrow will revover.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200007180617.IAA03375>