On Sat, 15 Sep 2012 09:13:49 +0100 Mark Murray wrote: > RW writes: > > So far no one has come up with a single cogent argument for > > compression. If you replace compression with hashing then the need > > modifying the kernel code is eliminated. > > Compression reduces file size without losing entropy;
So does hashing until way beyond the point where we have more entropy than we need to kickstart yarrow. Internally yarrow uses SHA256 hashing anyway. > in fact it > serves as an entropy concentrator. That said, I agree that its output > is still not small enough and its speed is unacceptable. The whole point of reducing the size is to fit it into the buffers, if it doesn't do that then it's a waste of CPU cycles. The motivation for going for this XOR hack is because compression doesn't solve the buffer depletion problem. Once you've made the kernel change, compression is probably counter-productive because it's then desirable to spread the entropy as evenly as possible. > > As for modifying kernel code, > > $ cat /dev/zero > /dev/random > > ... can swamp entropy harvesting. Its an obvious attack and easily > spotted/thwarted, but I'd like to defend against it; the current code > is a bit too naive. How can an unprivileged attacker do that during or before initrandom, without having enough privileges to make it unnecessary. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"