On Thu, Mar 25, 2010 at 2:16 AM, Brian Davis wrote:
> I think the question still stands, however, as to why the "main-line"
> hardened-sources are not being updated.
>
> > From: ca...@xwing.info
> > To: gentoo-hardened@lists.gentoo.org
> > Subject: Re: [gentoo-hardened] Regarding hardened-source
> > > I have no relationship with the entropy-key guys other than being
> > > a happy customer. They seem like a small shop and I think they deserve
> > > a plug (and really need to work on their presence via google...
> > > Searches on this stuff only turn up $400 alternatives... Sheesh)
> >
> >
On 23/03/2010 21:02, li...@m8y.org wrote:
On Tue, 23 Mar 2010, Ed W wrote:
OK, so to conclude the previous thread - I bought an entropy key from
the nice folks at Simtec via http://entropykey.co.uk
Short version is you plug it in, install the ekeyd package and even
on a hardened installation
On 25 Mar 2010 at 13:10, Rob Kendrick wrote:
> it goes to extraordinary lengths to make sure the entropy that is
> injected into your pool can't be sniffed before it gets there,
out of curiosity, what's that mean exactly?
On Thu, 25 Mar 2010, Ed W wrote:
On 23/03/2010 21:02, li...@m8y.org wrote:
On Tue, 23 Mar 2010, Ed W wrote:
> OK, so to conclude the previous thread - I bought an entropy key from
> the nice folks at Simtec via http://entropykey.co.uk
>
> Short version is you plug it in, install the ekey
On Csü, Március 25, 2010 20:23, li...@m8y.org wrote:
> On Thu, 25 Mar 2010, Ed W wrote:
>
>> On 23/03/2010 21:02, li...@m8y.org wrote:
>>> On Tue, 23 Mar 2010, Ed W wrote:
>>>
>>> > OK, so to conclude the previous thread - I bought an entropy key
>>> from
>>> > the nice folks at Simtec via http:
On Thu, 25 Mar 2010 15:23:52 -0400 (EDT)
li...@m8y.org wrote:
> Right, he simply turned /dev/random into /dev/urandom.
> I was under the impression the entropy key was simply a fancy PRNG.
> Now that I know it offers true randomness, I'm more impressed. Also
> curious exactly what it uses as a sou
On Thu, 25 Mar 2010 19:50:23 +0200
pagee...@freemail.hu wrote:
> > it goes to extraordinary lengths to make sure the entropy that is
> > injected into your pool can't be sniffed before it gets there,
>
> out of curiosity, what's that mean exactly?
That somebody with a few probes and a 50 quid
On 25/03/2010 17:50, pagee...@freemail.hu wrote:
On 25 Mar 2010 at 13:10, Rob Kendrick wrote:
it goes to extraordinary lengths to make sure the entropy that is
injected into your pool can't be sniffed before it gets there,
out of curiosity, what's that mean exactly?
I believe
On Thu, 25 Mar 2010 20:17:12 +
Ed W wrote:
> > out of curiosity, what's that mean exactly?
> >
> I believe that the random numbers are encrypted out of the device? I
> say that because when you start up the userspace daemon you tell it a
> long random number supplied with the device. I as
On 25/03/2010 20:11, Rob Kendrick wrote:
...
It's a pretty standard trick. What's special is that it uses two, and
mixes the contents together, and so it can detect when one fails. Oh,
and its price. (Other, much less sophisticated devices, cost as much
as ten times more and are toys in terms
On 25 Mar 2010 at 20:12, Rob Kendrick wrote:
> On Thu, 25 Mar 2010 19:50:23 +0200
> pagee...@freemail.hu wrote:
>
> > > it goes to extraordinary lengths to make sure the entropy that is
> > > injected into your pool can't be sniffed before it gets there,
> >
> > out of curiosity, what's that
On Thu, Mar 25, 2010 at 14:34, Ed W wrote:
> I noticed a munin script in the ekeyd download - haven't tried it, but the
> quantity of variables you can monitor from the device seemed quite
> impressive. Who would have thought you would have wanted to graph the
> temperature of your random number
On 25/03/10 21:34, Ed W wrote:
> On 25/03/2010 20:11, Rob Kendrick wrote:
>> ...
>> It's a pretty standard trick. What's special is that it uses two, and
>> mixes the contents together, and so it can detect when one fails. Oh,
>> and its price. (Other, much less sophisticated devices, cost as mu
On 25/03/2010 19:38, pagee...@freemail.hu wrote:
That somebody with a few probes and a 50 quid USB logic analyser can't
capture the entropy that was delivered to the system. (One of the
target markets is installation in shared co-location facilities.)
do they also protect against impers
On Thu, 25 Mar 2010 21:38:20 +0200
pagee...@freemail.hu wrote:
> > That somebody with a few probes and a 50 quid USB logic analyser
> > can't capture the entropy that was delivered to the system. (One
> > of the target markets is installation in shared co-location
> > facilities.)
>
> do they
16 matches
Mail list logo