Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Jan 2014 02:26:11 +0700
From:      Adam Strohl <adams-freebsd@ateamsystems.com>
To:        Mike Tancsa <mike@sentex.net>,  Darren Pilgrim <list_freebsd@bluerosetech.com>, freebsd-stable@freebsd.org
Subject:   Re: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-14:01.random
Message-ID:  <52D6E0D3.9060100@ateamsystems.com>
In-Reply-To: <52D6DC9C.3060007@sentex.net>
References:  <201401142011.s0EKBoi7082738@freefall.freebsd.org> <52D6BF9C.8070405@bluerosetech.com> <52D6D5C7.80200@sentex.net> <52D6D93F.7020600@bluerosetech.com> <52D6DC9C.3060007@sentex.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 1/16/2014 2:08, Mike Tancsa wrote:
> On 1/15/2014 1:53 PM, Darren Pilgrim wrote:
>>
>> Yes, that's an obvious consequence of a compromised RNG; but that's not
>> what I was asking.  I'm asking how the attacker could compromise the
>> hardware RNG without also obtaining effectively unfettered access to the
>> entire system.
>
> I think the fear is at manufacturing time.  i.e. the suspicion is that
> some govt agency asked a design weakness be built in.  Whether thats
> true or a reasonable fear or not, I am not one to say....

To 2nd this, it is assumed at this point that this has happened:

http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?52D6E0D3.9060100>