Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jul 2000 21:26:21 +0200
From:      Mark Murray <mark@grondar.za>
To:        "Jeroen C. van Gelderen" <jeroen@vangelderen.org>
Cc:        current@FreeBSD.ORG
Subject:   Re: randomdev entropy gathering is really weak 
Message-ID:  <200007211926.VAA00724@grimreaper.grondar.za>
In-Reply-To: <3978806C.8BD1EDD6@vangelderen.org> ; from "Jeroen C. van Gelderen" <jeroen@vangelderen.org>  "Fri, 21 Jul 2000 12:55:08 -0400."
References:  <3978806C.8BD1EDD6@vangelderen.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
> You generate a new PGP keypair and start using it. Your
> co-worker reboots your machine afterwards and recovers 
> the PRNG state that happens to be stashed on disk. He 
> can then backtrack and potentially recover the exact same
> random numbers that you used for your key.

Said state is rm'med after use. If you didn't detect the breakin,
your fault for poor intrusion detection. lets put the paranoia
to practical use and detect the breakin, not nitpick the systems
that are supposed to be protected.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200007211926.VAA00724>