On Tue, Jul 25, 2017 at 6:21 PM, Christian Huitema <huit...@huitema.net> wrote:
>
>
> On 7/25/2017 4:57 PM, Peter Gutmann wrote:
>
> Also, when we make such a recommendation in the TLS spec, we can hope that
> it
> will be heeded by the TLS developers, but what about the developers of
> applications and protocols sitting on top of TLS, such DTLS, QUIC or HTTP?
>
> They don't need to know or care about this, it's being used to generate the
> TLS nonce which is invisible to anything running over TLS.
>
> Are we talking about the same thing here?
>
>
> Not sure. I am looking at the implementations of QUIC. QUIC needs its own
> set of random numbers for things like connection ID or initial sequence
> number. The most natural thing to do is do get them from the OS API,
> /dev/random or cryptogenrandom(), but that requires platform specific code.
> The next natural thing to do is to reuse the random number generator
> configured for the TLS context, because it is not OS dependent. If that is
> not OK, then developers will need lots of explaining.

Why not write a cross-platform shim that calls the underlying OS
specific API, instead of implementing another broken RNG?

I feel the solution to broken RNG is don't use them. This entire
discussion is premised on an idea that anything can be done about this
"problem".

>
> --
> Christian Huitema
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to