"Bjoern A. Zeeb" writes:
> 1) continue to over-[fs]eed as we always did (seems out of question,
> no improvement)

See below. Solutions are very possible.

> 2) compress (as in gzip) the input of better_than_nothing (multiple
> people objected, no literature, questionable outcome, speed, still not
> great control over how much data we seed)

Not a bad idea, but by better handling of stuff written to /d/r this can
be made much more useful. Compressing is a very useful entropy distiller
in its own right, but is slow.

> 3) hash (arch dependent?) the entire input of better_than_nothing in
> the shell script (at least a good idea on how much data we seed)

Yup; same advantages as compression, but predictably sized output.  Like
compressing, its slow. Better handling of files witten to /d/r will also
help massively.

> 4) hash (arch dependent?) individual parts of better_than_nothing in
> the shell script (seed more and still know how much data we'd seed)

Doable. Useful.

> 5) send all data to the kernel but XORing the data together on
> overflow in the kernel (can control when buffer full and only then
> take action when needed, indepedent on how seed data is chosen,
> withdrawn)

I've already coded this up :-) (well, similar). This is the "improved
file handling" that I was thinking of. Note that I only do it for writes
to /d/r, and not for all entropy harvesting. It still largely kills the
entropy swamping, and while an attacker can subvert this, the attack
would be obvious.

I'll send patches (untested) in a couple of hours for discussion.

> 6) send all data to the kernel but XORing the data + counter value
> together on overflow in the kernel (can control when buffer full and
> only then take action when needed, indepedent on how seed data is
> chosen, but why XOR?)

Variation on above.

> 7) send all data to the kernel and hash (arch dependent?) it + counter
> value into the buffer on overflow, as in b[n] = H(b[n] + c + i[n]) in
> the kernel (can control when buffer full and only then take action
> when needed, indepedent on how seed data is chosen, uses standard
> technology)

Variation on above.

M
--
Mark R V Murray
Pi: 132511160

_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to