Re: ssh, /dev/urandom

2002-12-20 Thread Alfred M. Szmidt
My thinking on this issue is that energy is much better put into the correct and working solution. You're right.

Re: ssh, /dev/urandom

2002-12-20 Thread Marcus Brinkmann
On Thu, Dec 19, 2002 at 05:48:02PM -0500, Mark L. Kahnt wrote: > If my number theory was stronger, and I was more familiar with the > related code, I would be rather tempted, but my programming background > leans far more to compilers and API definitions, translations and > interfaces, as well as u

Re: ssh, /dev/urandom

2002-12-20 Thread Marcus Brinkmann
On Thu, Dec 19, 2002 at 12:45:07PM -0800, Thomas Bushnell, BSG wrote: > No, not at all. I don't want to give the user a fake feeling. I want > the user to be able to make a judgement "in this case, the security is > not important, but telnet is a major hassle, so I choose the fake > ssh". Nothi

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
If my number theory was stronger, and I was more familiar with the related code, I would be rather tempted, but my programming background leans far more to compilers and API definitions, translations and interfaces, as well as user interfaces. You don't usually want your compilers in

Re: ssh, /dev/urandom

2002-12-19 Thread Mark L. Kahnt
On Thu, 2002-12-19 at 17:33, Alfred M. Szmidt wrote: >I'd suggest that this matter might better be addressed off-list, or >else identified as something that the two of you are not going to >reach a common vision through the mechanism of the mailing list. > > We came to a conclusion tha

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
I'd suggest that this matter might better be addressed off-list, or else identified as something that the two of you are not going to reach a common vision through the mechanism of the mailing list. We came to a conclusion that I think everyone agrees with, and there is nothing off-topic

Re: ssh, /dev/urandom

2002-12-19 Thread Mark L. Kahnt
On Thu, 2002-12-19 at 14:52, Thomas Bushnell, BSG wrote: > "Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: > > >> Why do I feel like repeating this old mantra: Bad security is worse > >> than no security. > > > >Sez you. Many disagree. Especially for a system in development, with > >

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Neal H. Walfield) writes: > > If our only alternatives are > > > > 1) no ssh > > 2) ssh with no security > > Wrong, which just proves that you have not read this thread: we are > arguing about entropy; ssh is only a side argument. *IF*. Can you read the word *IF*? The propo

Re: ssh, /dev/urandom

2002-12-19 Thread Jeff Bailey
On Thu, Dec 19, 2002 at 04:10:25PM -0500, Neal H. Walfield wrote: > There is a fourth alternative: leave everything the way it is. If you > need some quality entropy copy it from e.g. a GNU/Linux system. This is what the buildd machine does, btw. Tks, Jeff Bailey

Re: ssh, /dev/urandom

2002-12-19 Thread Neal H. Walfield
>1) no ssh >2) ssh with no security > >you have advocated (2), right? It is that statement which I am >arguing against. > > No, I have advocated against including a unsecure random translator. > You are forgetting the third alternative, making ssh use its own > random pool. Assu

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
Then we are at an agreement I think. I took a quick look at Open SSH and its flags for gathering random entropy. From the looks the --with-rand-helper is the flag to use, but I think that the configure script should pick up the fact that we do not have /dev/random. I will take a closer look at t

Re: ssh, /dev/urandom

2002-12-19 Thread Neal H. Walfield
> If our only alternatives are > > 1) no ssh > 2) ssh with no security Wrong, which just proves that you have not read this thread: we are arguing about entropy; ssh is only a side argument.

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >If our only alternatives are > >1) no ssh >2) ssh with no security > >you have advocated (2), right? It is that statement which I am >arguing against. > > No, I have advocated against including a unsecure random translator. >

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
If our only alternatives are 1) no ssh 2) ssh with no security you have advocated (2), right? It is that statement which I am arguing against. No, I have advocated against including a unsecure random translator. You are forgetting the third alternative, making ssh use its own ra

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: > Please, could you bother reading my mails even for a small amount of > time? I have _not_, I repeat, _not_ suggested the removal of Open SSH! If our only alternatives are 1) no ssh 2) ssh with no security you have advocated (2), right? It is tha

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >>Telnet has worse security than even a buggy miserably fake ssh. >> >> Telnet has _no_ security. It doesn't have fake security, which you >> get by using crappy random bits and Open SSH. That is a huge >> difference. Open

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
Please, could you bother reading my mails even for a small amount of time? I have _not_, I repeat, _not_ suggested the removal of Open SSH!

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
>Telnet has worse security than even a buggy miserably fake ssh. > > Telnet has _no_ security. It doesn't have fake security, which you > get by using crappy random bits and Open SSH. That is a huge > difference. Open SSH was designed for security, telnet was _not_. What?

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >> I think that we can all accept that there are currently a variety of >> security holes in the Hurd. The type of security holes which would be >> introduced by using bad random data, however, is far worse as it has >> the potential

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >Telnet has worse security than even a buggy miserably fake ssh. > > Telnet has _no_ security. It doesn't have fake security, which you > get by using crappy random bits and Open SSH. That is a huge > difference. Open SSH was designed for secu

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
> I think that we can all accept that there are currently a variety of > security holes in the Hurd. The type of security holes which would be > introduced by using bad random data, however, is far worse as it has > the potential to allow an attacker to obtain access to systems that

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
Telnet has worse security than even a buggy miserably fake ssh. Telnet has _no_ security. It doesn't have fake security, which you get by using crappy random bits and Open SSH. That is a huge difference. Open SSH was designed for security, telnet was _not_.

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Neal H. Walfield) writes: > > > Why do I feel like repeating this old mantra: Bad security is worse > > > than no security. > > > > Sez you. Many disagree. Especially for a system in development, with > > already has bad security. > > I think that we can all accept that ther

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: > The argument is really simple. Programs that use /dev/urandom > generally expect to get numbers that are not only uniform, but numbers > which are actually *useful* for *cryptographic* purposes. Creating a > /dev/urandom that does something different is b

Re: ssh, /dev/urandom

2002-12-19 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >> Why do I feel like repeating this old mantra: Bad security is worse >> than no security. > >Sez you. Many disagree. Especially for a system in development, with >already has bad security. > > Fine, would you like to work on this

Re: ssh, /dev/urandom

2002-12-19 Thread PUYDT Julien
Le jeu 19/12/2002 à 15:44, Emile van Bergen a écrit : > Hi, > > On Thu, Dec 19, 2002 at 03:26:13PM +0100, PUYDT Julien wrote: > > > Le jeu 19/12/2002 à 15:18, Daniel Burrows a écrit : > > > On Thu, Dec 19, 2002 at 09:17:23AM +0100, PUYDT Julien <[EMAIL > > > PROTECTED]> was heard to say: > > > >

Re: ssh, /dev/urandom

2002-12-19 Thread Gaël Le Mignot
Niels a écrit : > The argument is really simple. Programs that use /dev/urandom > generally expect to get numbers that are not only uniform, but numbers > which are actually *useful* for *cryptographic* purposes. Creating a > /dev/urandom that does something different is breaking that inform

Re: ssh, /dev/urandom

2002-12-19 Thread Emile van Bergen
Hi, On Thu, Dec 19, 2002 at 03:26:13PM +0100, PUYDT Julien wrote: > Le jeu 19/12/2002 à 15:18, Daniel Burrows a écrit : > > On Thu, Dec 19, 2002 at 09:17:23AM +0100, PUYDT Julien <[EMAIL PROTECTED]> > > was heard to say: > > > Le mer 18/12/2002 à 18:45, Niels Möller a écrit : > > > > use some ot

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
One-time pads are definitely secure against any mathematical attack. (if you assume that the bits of the key are perfectly random) Basically, given an encrypted message, every key/plaintext combination is equally likely. And try to find out which one is the right message! Fun for th

Re: ssh, /dev/urandom

2002-12-19 Thread PUYDT Julien
Le jeu 19/12/2002 à 15:18, Daniel Burrows a écrit : > On Thu, Dec 19, 2002 at 09:17:23AM +0100, PUYDT Julien <[EMAIL PROTECTED]> > was heard to say: > > Le mer 18/12/2002 à 18:45, Niels Möller a écrit : > > > use some other construction that is secure even if the enemy has infinite > > > computati

Re: ssh, /dev/urandom

2002-12-19 Thread Daniel Burrows
On Thu, Dec 19, 2002 at 09:17:23AM +0100, PUYDT Julien <[EMAIL PROTECTED]> was heard to say: > Le mer 18/12/2002 à 18:45, Niels Möller a écrit : > > use some other construction that is secure even if the enemy has infinite > > computational power > > I'm pretty sure it isn't possible: One-time

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
There is still quantum cryptography. It's provable secure because if you sniff the message is destroyed. OTP is also there.

Re: ssh, /dev/urandom

2002-12-19 Thread Niels Möller
Budi Rahardjo <[EMAIL PROTECTED]> writes: > On Wed, Dec 18, 2002 at 12:54:17AM +0100, Ga?l Le Mignot wrote: > > No, we should use a random translator, which, at least, provide uniform > > numbers, and differents number on successive reads. > > I have not heard argument(s) against this. The argum

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
which one would you prefer? telnet or ssh (with weak encryption) What I prefer has nothing todo with this discussion. ssh is meant for security, telnet is not.

Re: mailing list admin-stuff (was: Re: ssh, /dev/urandom)

2002-12-19 Thread Alfred M. Szmidt
I belive you can remove duplicate mails based on the message ID.

Re: ssh, /dev/urandom

2002-12-19 Thread Alfred M. Szmidt
I have not heard argument(s) against this. Then please read the mailing list archives, Marcus already gave reasons. And it is not Ga?l's random translator, it was written by Marcus.

Re: ssh, /dev/urandom

2002-12-19 Thread PUYDT Julien
Le jeu 19/12/2002 à 10:56, Marcus Brinkmann a écrit : > There is still quantum cryptography. It's provable secure because if you > sniff the message is destroyed. > > However, it's not really something you can use today, although I think they > already managed to bridge a couple of meters over th

Re: ssh, /dev/urandom

2002-12-19 Thread Marcus Brinkmann
On Thu, Dec 19, 2002 at 09:17:23AM +0100, PUYDT Julien wrote: > Le mer 18/12/2002 à 18:45, Niels Möller a écrit : > > use some other construction that is secure even if the enemy has infinite > > computational power > > I'm pretty sure it isn't possible: > 1) you always want someone to read your m

Re: ssh, /dev/urandom

2002-12-19 Thread PUYDT Julien
Le mer 18/12/2002 à 18:45, Niels Möller a écrit : > use some other construction that is secure even if the enemy has infinite > computational power I'm pretty sure it isn't possible: 1) you always want someone to read your message; hence no cryptalgo can be infinitely secure, there must be some ke

Re: ssh, /dev/urandom

2002-12-18 Thread Budi Rahardjo
>> Why do I feel like repeating this old mantra: Bad security is worse >> than no security. which one would you prefer? telnet or ssh (with weak encryption) -- budi -- http://budi.insan.co.id

Re: ssh, /dev/urandom

2002-12-18 Thread Neal H. Walfield
> > Why do I feel like repeating this old mantra: Bad security is worse > > than no security. > > Sez you. Many disagree. Especially for a system in development, with > already has bad security. I think that we can all accept that there are currently a variety of security holes in the Hurd. Th

Re: mailing list admin-stuff (was: Re: ssh, /dev/urandom)

2002-12-18 Thread Jeff Bailey
On Thu, Dec 19, 2002 at 03:53:13AM +0700, Budi Rahardjo wrote: > could you just use when replying? > ie you don't have to add my name (or other people) in the Bcc: > We are all subscribers of the list. > I've been getting multiple copies. Once or twice is ok, but > too many of them is annoying :(

Re: ssh, /dev/urandom

2002-12-18 Thread Budi Rahardjo
On Wed, Dec 18, 2002 at 12:54:17AM +0100, Ga?l Le Mignot wrote: > No, we should use a random translator, which, at least, provide uniform > numbers, and differents number on successive reads. I have not heard argument(s) against this. Has anybody looked at kilobug's (Ga?l Le Mignot) random transla

mailing list admin-stuff (was: Re: ssh, /dev/urandom)

2002-12-18 Thread Budi Rahardjo
Folks, could you just use when replying? ie you don't have to add my name (or other people) in the Bcc: We are all subscribers of the list. I've been getting multiple copies. Once or twice is ok, but too many of them is annoying :( [ps: I am not the admin of this list, just giving a suggestion.]

Re: ssh, /dev/urandom

2002-12-18 Thread Alfred M. Szmidt
> Why do I feel like repeating this old mantra: Bad security is worse > than no security. Sez you. Many disagree. Especially for a system in development, with already has bad security. Fine, would you like to work on this? Or do you purpose to worse the already bad security?

Re: ssh, /dev/urandom

2002-12-18 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >Ssh should provide a non-cryptographically secure mode (such as >using hashes of the low time bits, for example) for use on systems >without a real random bit source. > > What Open SSH should do and not do, should be discussed on the Ope

Re: ssh, /dev/urandom

2002-12-18 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: > Why do I feel like repeating this old mantra: Bad security is worse > than no security. Sez you. Many disagree. Especially for a system in development, with already has bad security.

Re: ssh, /dev/urandom

2002-12-18 Thread Niels Möller
[EMAIL PROTECTED] (Gaël Le Mignot) writes: > This is the current implementation, yes, but /dev/urandom doesn't guarantee > anything about the "quality" of the random bits. It can be secure, but it > can be pseudo-random too, and any program that use /dev/urandom as a secure > source of random bits

Re: ssh, /dev/urandom

2002-12-18 Thread Werner Koch
On Wed, 18 Dec 2002 11:58:52 +0100, Gaël Le Mignot said: > This is the current implementation, yes, but /dev/urandom doesn't guarantee > anything about the "quality" of the random bits. It can be secure, but it It does. It even blocks (well, I checked years ago) as long as the entropy pools has

Re: ssh, /dev/urandom

2002-12-18 Thread Marcus Brinkmann
On Wed, Dec 18, 2002 at 11:58:52AM +0100, Gaël Le Mignot wrote: > > Werner a écrit : > > > On Tue, 17 Dec 2002 13:36:21 +0100, Gaël Le Mignot said: > >> And /dev/urandom is not really done for "cryptographic secure" randomness, > >> it's the goal of /dev/random, not /dev/urandom (and AFAIK ss

Re: ssh, /dev/urandom

2002-12-18 Thread Gaël Le Mignot
Werner a écrit : > On Tue, 17 Dec 2002 13:36:21 +0100, Gaël Le Mignot said: >> And /dev/urandom is not really done for "cryptographic secure" randomness, >> it's the goal of /dev/random, not /dev/urandom (and AFAIK ssh only uses > That is not really true. The common implementations of /dev

Re: ssh, /dev/urandom

2002-12-18 Thread Werner Koch
On Tue, 17 Dec 2002 13:36:21 +0100, Gaël Le Mignot said: > And /dev/urandom is not really done for "cryptographic secure" randomness, > it's the goal of /dev/random, not /dev/urandom (and AFAIK ssh only uses That is not really true. The common implementations of /dev/[u]random for *BSD and Linux

Re: ssh, /dev/urandom

2002-12-18 Thread Gaël Le Mignot
Philip a écrit : > 2. Does ssh only use urandom once, that is to generate keys while it is > configuring? Again I have assumed yes. ssh-keygen uses /dev/random to generate keys. ssh and sshd uses /dev/urandom when they need weak random bits, like for creating the temporary symetric key. At

Re: ssh, /dev/urandom

2002-12-18 Thread Oystein Viggen
* [Thomas Bushnell, BSG] > Ssh should provide a non-cryptographically secure mode (such as using > hashes of the low time bits, for example) for use on systems without a > real random bit source. I believe it does even better, and provides a mode where it hashes the output of "ps aux" and suchli

Re: ssh, /dev/urandom

2002-12-17 Thread Philip Charles
On Tue, 17 Dec 2002, Hubert Chan wrote: > Philip> 2. Does ssh only use urandom once, that is to generate keys while it > is > Philip> configuring? Again I have assumed yes. > > I don't think the public/private key (i.e. host key) generation is much > of an issue, since one should be able to gen

Re: ssh, /dev/urandom

2002-12-17 Thread Hubert Chan
> "Philip" == Philip Charles <[EMAIL PROTECTED]> writes: Q1, I don't know the answer to, but I believe that your guess is right. [...] Philip> 2. Does ssh only use urandom once, that is to generate keys while it is Philip> configuring? Again I have assumed yes. I don't think the public/pr

Re: ssh, /dev/urandom

2002-12-17 Thread Philip Charles
On 17 Dec 2002, Thomas Bushnell, BSG wrote: > Ssh should provide a non-cryptographically secure mode (such as using > hashes of the low time bits, for example) for use on systems without a > real random bit source. > > If it does not use that, it is reasonable for us to use a hack to > provide som

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
No, we should use a random translator, which, at least, provide uniform numbers, and differents number on successive reads. Why do I feel like repeating this old mantra: Bad security is worse than no security.

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
Ssh should provide a non-cryptographically secure mode (such as using hashes of the low time bits, for example) for use on systems without a real random bit source. What Open SSH should do and not do, should be discussed on the Open SSH mailing list, not here.

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Neal a écrit : >> > Your argument is absurd. Network security considerations are different >> > than local system security considerations. We have control over who can >> > have an account on our systems. We don't necessarily have control over >> > who has access to our IP ports. >> >>

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >I agree that we should not have a fictitious /dev/urandom, but we >should support ssh even so. > > Open SSH is supported, in an insecure way, by either a random > translator, or the copying hack. Ssh should provide a non-cryptographically s

Re: creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Wolfgang Jaehrling
On Wed, Dec 18, 2002 at 05:24:40AM +0700, Budi Rahardjo wrote: > I guess most of you work on the GNU/Hurd in front of consoles, > thus have no problem having no ssh (or assume that people could > install it themselves). Fair enough... I am using telnet. :) > Now, could somebody point a quick tuto

Re: ssh, /dev/urandom

2002-12-17 Thread Neal H. Walfield
> > Your argument is absurd. Network security considerations are different > > than local system security considerations. We have control over who can > > have an account on our systems. We don't necessarily have control over > > who has access to our IP ports. > > These are all excellent reaso

Re: creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Alfred M. Szmidt
Has everyone forgotten what this discussion actually about? We are not talking about removing the Open SSH deb! We are talking about adding ugly hacks like a broken random translator, or copying files in-place of /dev/urandom.

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
I agree that we should not have a fictitious /dev/urandom, but we should support ssh even so. Open SSH is supported, in an insecure way, by either a random translator, or the copying hack.

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
None of them are reasons to remove functionality. No functionality is being removed.

Re: creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Jeff Bailey
On Wed, Dec 18, 2002 at 05:24:40AM +0700, Budi Rahardjo wrote: > PS: is there anybody working on sendmail package? it compiles clean > under GNU/Hurd. Last I checked there were several dependencies that did not compile cleanly. =( It's been about a year since I tried, though. Tks, Jeff Bailey

creating debian packages (was: Re: ssh, /dev/urandom)

2002-12-17 Thread Budi Rahardjo
Ok. We all have read views from both sides. Let's stop the flames. I guess most of you work on the GNU/Hurd in front of consoles, thus have no problem having no ssh (or assume that people could install it themselves). Fair enough... Now, could somebody point a quick tutorial (for impatient people)

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: >Really, I don't think we delete packages just because we have bugs. >We have *lots* of bugs, and it's inappopriate to remove packages as >if we were a production system. > > Delete what exactly? We were talking about _adding_ a package.

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
Jeff Bailey <[EMAIL PROTECTED]> writes: > On Tue, Dec 17, 2002 at 11:07:35AM -0800, Thomas Bushnell, BSG wrote: > > > > Without ext2fs the system is completly unusable, without random the > > > system is quite usable. Without GNU Mach you don't even have a > > > working system. > > > But you sa

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
But you said that "bad security is worse than no security". So better no GNU Mach than an insecure one, right? A system works just fine without a random translator, it does not work at all without an secure, or insecure kernel. A random translator is _not_ a crucial part of an system, a ke

Re: ssh, /dev/urandom

2002-12-17 Thread Jeff Bailey
On Tue, Dec 17, 2002 at 11:07:35AM -0800, Thomas Bushnell, BSG wrote: > > Without ext2fs the system is completly unusable, without random the > > system is quite usable. Without GNU Mach you don't even have a > > working system. > But you said that "bad security is worse than no security". So b

Re: ssh, /dev/urandom

2002-12-17 Thread Thomas Bushnell, BSG
"Alfred M. Szmidt" <[EMAIL PROTECTED]> writes: > Without ext2fs the system is completly unusable, without random the > system is quite usable. Without GNU Mach you don't even have a > working system. But you said that "bad security is worse than no security". So better no GNU Mach than an insec

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >With allowing GNU/Hurd _users_ to _use_ an ssh client. > What exactly prevents them from not using it? They can download the > random translator and use it, If they know where to find it. And it's a waste of time. And it makes things more complex and tricky than they

Re: ssh, /dev/urandom

2002-12-17 Thread Alfred M. Szmidt
With allowing GNU/Hurd _users_ to _use_ an ssh client. What exactly prevents them from not using it? They can download the random translator and use it, they can use the copying hack. Nothing prevents them from not usin ssh. It also makes them aware that it is insecrue, adding it hides this

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >Why there are problems to enhace GNU/Hurd? > Enhance the Hurd how exactly? With flawed security? With allowing GNU/Hurd _users_ to _use_ an ssh client. >Sooner or later hurd/random(?) server will be added to the base >system...why not now? > Because it is br

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-17 Thread Alfred M. Szmidt
Why there are problems to enhace GNU/Hurd? Enhance the Hurd how exactly? With flawed security? Sooner or later hurd/random(?) server will be added to the base system...why not now? Because it is broken (in the sense of no good entropy source). Fix the problems, and it might get added.

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-17 Thread pancake
On Tue, Dec 17, 2002 at 12:42:59PM +0100, Alfred M. Szmidt wrote: >I support the addition of ssh, *even* with a weak random. > > There was never any talk about removing ssh. > >Now, what's current best practice? We use this: > http://kilobug.free.fr/hurd/random-64.tar.gz >Is the

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Alfred a écrit : >I support the addition of ssh, *even* with a weak random. > There was never any talk about removing ssh. >Now, what's current best practice? We use this: > http://kilobug.free.fr/hurd/random-64.tar.gz >Is there a better alternative(s)? > Or you can cop

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-17 Thread Alfred M. Szmidt
I support the addition of ssh, *even* with a weak random. There was never any talk about removing ssh. Now, what's current best practice? We use this: http://kilobug.free.fr/hurd/random-64.tar.gz Is there a better alternative(s)? Or you can copy /bin/bash to /dev/urandom, they are

Re: ssh, /dev/urandom

2002-12-17 Thread Gaël Le Mignot
Philip a écrit : > The warning displayed at the end of total.sh > echo "A file needs to be copied to /dev/urandom before ssh will configure" > echo "then run . Security will be poor unless the file" > echo "consists of random material." Copying a file is even worse random data than using t

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-16 Thread Neal H. Walfield
> I support the addition of ssh, *even* with a weak random. ssh is not being excluded; it is in the archive, if you want it, you just have to set it up yourself. By helping the user with this horrible kludge--essentially installing pregenerated host keys--we are creating a false sense of security

Re: ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-16 Thread Philip Charles
On Tue, 17 Dec 2002, Budi Rahardjo wrote: > Even ssh/ssl had problems, but that doesn't stop people from > using it *right now*. ie. not waiting until it is really ... really ... > realy ... really (well, you get the point) secure. > > Just give a warning that current ssh implementation is not tha

ssh, /dev/urandom (was: Re: K1 images - final report?)

2002-12-16 Thread Budi Rahardjo
I support the addition of ssh, *even* with a weak random. The problem is, without ssh ... I would have to resort to telnet. I have to manage/operate/update our GNU/hurd through network and I am assuming many are in the same situation. "Weak" ssh is better than telnet. Having a minimal clothes is be