On Friday 23 August 2013 11:31:06 Vladimir 'φ-coder/phcoder' Serbinenko wrote:
> > There is a warning about random generator not being secure in
> > util/grub-mkpasswd-pbkdf2.c, which may be supressed by adding "&& !
> > defined (__OpenBSD__)" to the defines list.
>
> To do this we need a confirmation that reading from /dev/urandom is
> indeed the right way to access PRNG on OpenBSD and that it gives us
> cryptographically good random.

On OpenBSD, all random pseudo-devices (random, arandom, srandom, urandom) 
provide cryptographically good random.
From the random(4) man page:

DESCRIPTION
     The various random devices produce high quality random output data.
     Entropy data is collected from system activity (like disk, network, and
     clock device interrupts and such), and then run through various hash or
     message digest functions to generate the output.  All the random devices
     are expected to provide high quality pseudo-random output data.

     The arc4random(3) function in userland libraries seeds itself from this
     device (or with the sysctl(3) interface), providing a second level of
     ARC4 hashed data without the need to access these devices every time.

--
Ilya

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to