Re: ssh, /dev/urandom

2002-12-17 Thread Philip Charles
On Tue, 17 Dec 2002, Hubert Chan wrote: > Philip> 2. Does ssh only use urandom once, that is to generate keys while it > is > Philip> configuring? Again I have assumed yes. > > I don't think the public/private key (i.e. host key) generation is much > of an issue, since one should be able to gen

Re: ssh, /dev/urandom

2002-12-17 Thread Hubert Chan
> "Philip" == Philip Charles <[EMAIL PROTECTED]> writes: Q1, I don't know the answer to, but I believe that your guess is right. [...] Philip> 2. Does ssh only use urandom once, that is to generate keys while it is Philip> configuring? Again I have assumed yes. I don't think the public/pr

Re: creating debian packages

2002-12-17 Thread Robert Millan
On Wed, Dec 18, 2002 at 12:53:23AM +0100, Gaël Le Mignot wrote: > > I totally agree with this idea. For a while at least, having a > 'hurd-extras' package with some unfished translators like random, > httpfs or whatever could be very usefull. And we just have to add a > hurd-specif

24 hours, enjoy casino. ¾È¹æ Ä«Áö³ë

2002-12-17 Thread Ä«Áö³ë

Re: ssh, /dev/urandom

2002-12-17 Thread Philip Charles
On 17 Dec 2002, Thomas Bushnell, BSG wrote: > Ssh should provide a non-cryptographically secure mode (such as using > hashes of the low time bits, for example) for use on systems without a > real random bit source. > > If it does not use that, it is reasonable for us to use a hack to > provide som

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
No, we should use a random translator, which, at least, provide uniform numbers, and differents number on successive reads. Why do I feel like repeating this old mantra: Bad security is worse than no security.

Re: creating debian packages

2002-12-17 Thread Alfred M. Szmidt
I totally agree with this idea. For a while at least, having a 'hurd-extras' package with some unfished translators like random, httpfs or whatever could be very usefull. And we just have to add a hurd-specific dependancy on ssh to hurd-extras for our current problem. Would you li

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
Ssh should provide a non-cryptographically secure mode (such as using hashes of the low time bits, for example) for use on systems without a real random bit source. What Open SSH should do and not do, should be discussed on the Open SSH mailing list, not here.

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Neal a écrit : >> > Your argument is absurd. Network security considerations are different >> > than local system security considerations. We have control over who can >> > have an account on our systems. We don't necessarily have control over >> > who has access to our IP ports. >> >>

Re: creating debian packages

2002-12-17 Thread Gaël Le Mignot
Wolfgang a écrit : >> Now, could somebody point a quick tutorial (for impatient people) >> on creating debian packages? Maybe we (or maybe kilobug?) could >> create an ssh debian package and put it somewhere (I would love >> to mirror it). > `ssh package'? You are confused. I think you ac

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >I agree that we should not have a fictitious /dev/urandom, but we >should support ssh even so. > > Open SSH is supported, in an insecure way, by either a random > translator, or the copying hack. Ssh should provide a non-cryptographically s

Re: creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Wolfgang Jaehrling
On Wed, Dec 18, 2002 at 05:24:40AM +0700, Budi Rahardjo wrote: > I guess most of you work on the GNU/Hurd in front of consoles, > thus have no problem having no ssh (or assume that people could > install it themselves). Fair enough... I am using telnet. :) > Now, could somebody point a quick tuto

Re: ssh, /dev/urandom

2002-12-17 Thread Neal H. Walfield
> > Your argument is absurd. Network security considerations are different > > than local system security considerations. We have control over who can > > have an account on our systems. We don't necessarily have control over > > who has access to our IP ports. > > These are all excellent reaso

Re: creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Alfred M. Szmidt
Has everyone forgotten what this discussion actually about? We are not talking about removing the Open SSH deb! We are talking about adding ugly hacks like a broken random translator, or copying files in-place of /dev/urandom.

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
I agree that we should not have a fictitious /dev/urandom, but we should support ssh even so. Open SSH is supported, in an insecure way, by either a random translator, or the copying hack.

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
None of them are reasons to remove functionality. No functionality is being removed.

Re: creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Jeff Bailey
On Wed, Dec 18, 2002 at 05:24:40AM +0700, Budi Rahardjo wrote: > PS: is there anybody working on sendmail package? it compiles clean > under GNU/Hurd. Last I checked there were several dependencies that did not compile cleanly. =( It's been about a year since I tried, though. Tks, Jeff Bailey

creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Budi Rahardjo
Ok. We all have read views from both sides. Let's stop the flames. I guess most of you work on the GNU/Hurd in front of consoles, thus have no problem having no ssh (or assume that people could install it themselves). Fair enough... Now, could somebody point a quick tutorial (for impatient people)

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >Really, I don't think we delete packages just because we have bugs. >We have *lots* of bugs, and it's inappopriate to remove packages as >if we were a production system. > > Delete what exactly? We were talking about _adding_ a package.

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
Jeff Bailey <[EMAIL PROTECTED]> writes: > On Tue, Dec 17, 2002 at 11:07:35AM -0800, Thomas Bushnell, BSG wrote: > > > > Without ext2fs the system is completly unusable, without random the > > > system is quite usable. Without GNU Mach you don't even have a > > > working system. > > > But you sa

Re: K1 images - final report?

2002-12-17 Thread Moritz Schulte
[EMAIL PROTECTED] (Thomas Bushnell, BSG) writes: > Why do you think it would necessarily be too slow? Well, of course it creates `some' overhead, since it is another layer on top of the real filesystem, through which path lookups are routed. I am not sure, wether that is already too much overhead

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
But you said that "bad security is worse than no security". So better no GNU Mach than an insecure one, right? A system works just fine without a random translator, it does not work at all without an secure, or insecure kernel. A random translator is _not_ a crucial part of an system, a ke

Re: ssh, /dev/urandom

2002-12-17 Thread Jeff Bailey
On Tue, Dec 17, 2002 at 11:07:35AM -0800, Thomas Bushnell, BSG wrote: > > Without ext2fs the system is completly unusable, without random the > > system is quite usable. Without GNU Mach you don't even have a > > working system. > But you said that "bad security is worse than no security". So b

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: > Without ext2fs the system is completly unusable, without random the > system is quite usable. Without GNU Mach you don't even have a > working system. But you said that "bad security is worse than no security". So better no GNU Mach than an insec

Re: K1 images - final report?

2002-12-17 Thread Thomas Bushnell, BSG
Moritz Schulte <[EMAIL PROTECTED]> writes: > Michal 'hramrach' Suchanek <[EMAIL PROTECTED]> writes: > > > - the separation of partitions should be solved by union(shadow)fs > > and not directories > > I have one doubt about using a unionfs as root filesystem: > performance. Why do you think i

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >With allowing GNU/Hurd _users_ to _use_ an ssh client. > What exactly prevents them from not using it? They can download the > random translator and use it, If they know where to find it. And it's a waste of time. And it makes things more complex and tricky than they

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
With allowing GNU/Hurd _users_ to _use_ an ssh client. What exactly prevents them from not using it? They can download the random translator and use it, they can use the copying hack. Nothing prevents them from not usin ssh. It also makes them aware that it is insecrue, adding it hides this

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >Why there are problems to enhace GNU/Hurd? > Enhance the Hurd how exactly? With flawed security? With allowing GNU/Hurd _users_ to _use_ an ssh client. >Sooner or later hurd/random(?) server will be added to the base >system...why not now? > Because it is br

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-17 Thread Alfred M. Szmidt
Why there are problems to enhace GNU/Hurd? Enhance the Hurd how exactly? With flawed security? Sooner or later hurd/random(?) server will be added to the base system...why not now? Because it is broken (in the sense of no good entropy source). Fix the problems, and it might get added.

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-17 Thread pancake
On Tue, Dec 17, 2002 at 12:42:59PM +0100, Alfred M. Szmidt wrote: >I support the addition of ssh, *even* with a weak random. > > There was never any talk about removing ssh. > >Now, what's current best practice? We use this: > http://kilobug.free.fr/hurd/random-64.tar.gz >Is the

Re: K1 images - final report?

2002-12-17 Thread Alfred M. Szmidt
> Open SSH does collect its own random data (from ps, and whatever else) > + from /dev/random and /dev/urandom. Now, why does it _have_ to use > /dev/urandom? Ask the OpenSSH people. :) /dev/urandom is _not_ cryptographically secure random data. It's fast, cheap random data. Not

Re: K1 images - final report?

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >I find it a little odd that you need to have /dev/urandom for >openssh to work, I thought openssh was ported to plenty of systems >that don't have and never had any /dev/u?random. > Open SSH does collect its own random data (from ps, and whatever else) > + fro

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >I support the addition of ssh, *even* with a weak random. > There was never any talk about removing ssh. >Now, what's current best practice? We use this: > http://kilobug.free.fr/hurd/random-64.tar.gz >Is there a better alternative(s)? > Or you can cop

Re: K1 images - final report?

2002-12-17 Thread Alfred M. Szmidt
I find it a little odd that you need to have /dev/urandom for openssh to work, I thought openssh was ported to plenty of systems that don't have and never had any /dev/u?random. Open SSH does collect its own random data (from ps, and whatever else) + from /dev/random and /dev/urandom. No

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-17 Thread Alfred M. Szmidt
I support the addition of ssh, *even* with a weak random. There was never any talk about removing ssh. Now, what's current best practice? We use this: http://kilobug.free.fr/hurd/random-64.tar.gz Is there a better alternative(s)? Or you can copy /bin/bash to /dev/urandom, they are

Re: K1 images - final report?

2002-12-17 Thread Moritz Schulte
Michal 'hramrach' Suchanek <[EMAIL PROTECTED]> writes: > - the separation of partitions should be solved by union(shadow)fs > and not directories I have one doubt about using a unionfs as root filesystem: performance. moritz -- [EMAIL PROTECTED] - http://duesseldorf.ccc.de/~mo

Re: K1 images - final report?

2002-12-17 Thread Niels Möller
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: > Strong security that uses encryption like DSA/RSA depends on a good > entropy source of random bits, we don't have one. And it's particularly nasty with DSA. If you create DSA signatures with a bad randomness generator, you risk leaking your privat

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Philip a écrit : > The warning displayed at the end of total.sh > echo "A file needs to be copied to /dev/urandom before ssh will configure" > echo "then run . Security will be poor unless the file" > echo "consists of random material." Copying a file is even worse random data than using t