From owner-freebsd-current@FreeBSD.ORG Tue Feb 17 19:39:51 2015 Return-Path: Delivered-To: current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 047B3721 for ; Tue, 17 Feb 2015 19:39:51 +0000 (UTC) Received: from mail-ie0-f171.google.com (mail-ie0-f171.google.com [209.85.223.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C795C8B2 for ; Tue, 17 Feb 2015 19:39:50 +0000 (UTC) Received: by iecvy18 with SMTP id vy18so43286974iec.13 for ; Tue, 17 Feb 2015 11:39:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=Nie68QfjKB8cJtBPF2Yom3nfotpkhshi0cqX7OZTa4Y=; b=RGlSgFQQbIS3Mvs4VRnocDpvF7COQzMZuF1wMEprW3NzJYxiIzhkdJP3SVVhHRHi0J BV8cyE6er27h2hwi2888c47Y22ff9kW/nocRxJuC/Lt4I08osng8lR8bImcLpl4/VMUD U8IeNu8AlAKz8KcZW1CdkD+Z10/zUsGNTnlaEkzrreMWic4gBeC47+/j+DDUn7Ap/S7f uvshZpSaY79Jd7H5n5BnoaR3ZsIU8zBjXfeXJi446vMIYk30chXnnfdfGhDODxCKNXzu mJlXpZTqxU4q5Zg7Um8fgVt95ChMftmpJSqGhSBTiehdaVbn+wcORbliPj+EHhacSyTR AWwQ== X-Received: by 10.50.97.41 with SMTP id dx9mr29648301igb.1.1424201989576; Tue, 17 Feb 2015 11:39:49 -0800 (PST) MIME-Version: 1.0 Sender: carpeddiem@gmail.com Received: by 10.107.158.19 with HTTP; Tue, 17 Feb 2015 11:39:28 -0800 (PST) In-Reply-To: References: <20150217173726.GA1953@funkthat.com> From: Ed Maste Date: Tue, 17 Feb 2015 14:39:28 -0500 X-Google-Sender-Auth: zHibG75LmzQzj_JFbpmH4Bhtp9A Message-ID: Subject: Re: URGENT: RNG broken for last 4 months To: John-Mark Gurney Content-Type: text/plain; charset=UTF-8 Cc: "current@freebsd.org" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Feb 2015 19:39:51 -0000 On 17 February 2015 at 13:15, Ed Maste wrote: > > One other point - this only applies to keys generated while running on > a kernel in that range. If you previously generated keys and then > upgraded to r273872 or later there's no concern with respect to key > randomness from this issue. One further followup, it's been pointed out that a lack of entropy can leak DSA private key material. See for example: http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/ https://www.imperialviolet.org/2013/06/15/suddendeathentropy.html In other words, an existing key does not become less random as a result of this flaw (which is the point I was trying to make), but it the flaw could cause it to be exposed.