On Mon, Sep 11, 2006 at 03:27:59PM -0500, Robert J. Hansen wrote: > Josef Wolf wrote:
> 1. /dev/random isn't available on all platforms. GnuPG's random number > generator is. Don't most unices have /dev/random nowadays? I never planned to run this thing on a windows box :) > 2. /dev/random is exhaustible. This is a Bad And Wrong for crypto > applications. Hmm, the only drawback I see is a slowdown. The application will just hang and wait for more entropy to arrive. But I don't see how security would be compromised by emptying /dev/random. Or will gpg fall back to something bad in such a situation? Would it be better to have a random_seed lying around there? Isn't it better to be slow than unsecure? How many random data does gpg consume when encrypting? > 3. /dev/random is, as I understand it, an ad-hoc design. Many people > who need crypto software need vetted, certified designs (even if the > software itself isn't certified). E.g., some people may require ANSI > X9.17 RNG. With a software RNG, it's fairly easy to just drop in > whatever RNG you need. Ough... I always thought /dev/random has the highest possible quality. How can a RNG be more random than real entropy? > > Does --no-random-seed-file force /dev/random to be used? > > Platform-dependent. Obviously, --no-random-seed-file won't force > /dev/random to be used if you're on a system that has no /dev/random > (e.g., Win32). You need to tell us the precise system environment > before we can really answer these kinds of questions. Sorry, forgot that. It is supposed to run on linux. > > sendbackup runs gnutar as root and gpg as backupclient. To make sure > > that [EMAIL PROTECTED] is not able to request unencrypted data, I > > need to make sure that backupclient is not able to modify the > > keyring. > > I'm having a cognitive disconnect here. How does the _client's_ > inability to modify the keyring affect the _server's_ ability to request > unencrypted data? The server has shell access via ssh to [EMAIL PROTECTED] He can create its own keyring and replace the one on client's account. The requested backup is encrypted with backupserver's key now. The attack is similar to a MITM attack. This is why I want the keyring be modifiable only by [EMAIL PROTECTED] Basically, I want the setup to be secure even if backupclient's account should be compromised. I think this strategy will not do any harm. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users