Date: Fri, 21 Jul 2000 21:26:21 +0200 From: Mark Murray <mark@grondar.za> To: "Jeroen C. van Gelderen" <jeroen@vangelderen.org> Cc: current@FreeBSD.ORG Subject: Re: randomdev entropy gathering is really weak Message-ID: <200007211926.VAA00724@grimreaper.grondar.za> In-Reply-To: <3978806C.8BD1EDD6@vangelderen.org> ; from "Jeroen C. van Gelderen" <jeroen@vangelderen.org> "Fri, 21 Jul 2000 12:55:08 -0400." References: <3978806C.8BD1EDD6@vangelderen.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> You generate a new PGP keypair and start using it. Your > co-worker reboots your machine afterwards and recovers > the PRNG state that happens to be stashed on disk. He > can then backtrack and potentially recover the exact same > random numbers that you used for your key. Said state is rm'med after use. If you didn't detect the breakin, your fault for poor intrusion detection. lets put the paranoia to practical use and detect the breakin, not nitpick the systems that are supposed to be protected. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200007211926.VAA00724>