On Mon, 3 Sep 2012 00:57:08 +0100
RW wrote:

> On Sun, 02 Sep 2012 15:20:31 -0700
> Doug Barton wrote:
> 
> > On 08/22/2012 11:43, David E. O'Brien wrote:
> > > Author: obrien
> > > Date: Wed Aug 22 18:43:21 2012
> > > New Revision: 239569
> > > URL: http://svn.freebsd.org/changeset/base/239569
> > > 
> > > Log:
> > >   Remove old entropy seeding after consumption
> > > initializing /dev/random PRNG. Not doing so opens us up to replay
> > > attacks.
> > 
> > I object to this change, and would like to see it discussed more.
> 
>  
> No entropy file is effectively equivalent to a known file and anything
> is better than that. Simply writing out a new version of /entropy
> would be better.
> 
> 
> The more significant problem is that initrandom dumps some very
> low-grade entropy into /dev/random before the entropy file (see
> below). Since /dev/random has very limited buffering, and processes
> the buffers in a timed loop, it's almost certain that the first
> entropy file is completely discarded. IMO the order should be
> reversed or the low-grade stuff should be piped through sha256. 


I see that in CURRENT the order is reversed, but it's still repeating
the same problem of saturating the buffers. Now most of of the
low-grade entropy is going to be lost include the date, which in almost
all cases would have eliminated any problem with a reused entropy file.
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to