Date: Thu, 16 Jan 2014 02:26:11 +0700 From: Adam Strohl <adams-freebsd@ateamsystems.com> To: Mike Tancsa <mike@sentex.net>, Darren Pilgrim <list_freebsd@bluerosetech.com>, freebsd-stable@freebsd.org Subject: Re: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-14:01.random Message-ID: <52D6E0D3.9060100@ateamsystems.com> In-Reply-To: <52D6DC9C.3060007@sentex.net> References: <201401142011.s0EKBoi7082738@freefall.freebsd.org> <52D6BF9C.8070405@bluerosetech.com> <52D6D5C7.80200@sentex.net> <52D6D93F.7020600@bluerosetech.com> <52D6DC9C.3060007@sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On 1/16/2014 2:08, Mike Tancsa wrote: > On 1/15/2014 1:53 PM, Darren Pilgrim wrote: >> >> Yes, that's an obvious consequence of a compromised RNG; but that's not >> what I was asking. I'm asking how the attacker could compromise the >> hardware RNG without also obtaining effectively unfettered access to the >> entire system. > > I think the fear is at manufacturing time. i.e. the suspicion is that > some govt agency asked a design weakness be built in. Whether thats > true or a reasonable fear or not, I am not one to say.... To 2nd this, it is assumed at this point that this has happened: http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?52D6E0D3.9060100>