Date: Wed, 15 Jan 2014 14:36:02 -0500 From: Jim Ohlstein <jim@ohlste.in> To: Mike Tancsa <mike@sentex.net>, Darren Pilgrim <list_freebsd@bluerosetech.com> Subject: Re: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-14:01.random Message-ID: <52D6E322.8030000@ohlste.in> In-Reply-To: <52D6DC9C.3060007@sentex.net> References: <201401142011.s0EKBoi7082738@freefall.freebsd.org> <52D6BF9C.8070405@bluerosetech.com> <52D6D5C7.80200@sentex.net> <52D6D93F.7020600@bluerosetech.com> <52D6DC9C.3060007@sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello, On 1/15/14, 2:08 PM, Mike Tancsa wrote: > On 1/15/2014 1:53 PM, Darren Pilgrim wrote: >> >> Yes, that's an obvious consequence of a compromised RNG; but that's not >> what I was asking. I'm asking how the attacker could compromise the >> hardware RNG without also obtaining effectively unfettered access to the >> entire system. > > I think the fear is at manufacturing time. i.e. the suspicion is that > some govt agency asked a design weakness be built in. Whether thats > true or a reasonable fear or not, I am not one to say.... > > > ---Mike > > If you belive the NY Times (et alia), it is a legitimate concern: http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html?_r=1& -- Jim Ohlstein
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?52D6E322.8030000>