[129652] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: On the "randomness" of DNS

daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Aug 4 17:18:37 2008

Date: Sat, 02 Aug 2008 22:51:53 +0100
From: Ben Laurie <ben@links.org>
To: =?ISO-8859-1?Q?Philipp_G=FChring?= <pg@futureware.at>
CC: cryptography@metzdowd.com
In-Reply-To: <489185CB.2090200@futureware.at>

Philipp Gühring wrote:
> Hi,
> 
> I would suggest to use http://www.cacert.at/random/ to test the 
> randomness of the DNS source ports. Due to the large variety of 
> random-number sources that have been tested there already, it's useful 
> as a classification service of unknown randomly looking numbers.
> You just have to collect 12 MB of numbers from a DNS server and upload 
> it there. (If you get 2 Bytes per request, that's 6 million requests you 
> have to do)
> 
>>> I don't see the point of evaluating the quality of a random number
>>> generator by statistical tests.
> 
> We successfully used statistical tests to detect broken random number 
> generators, we informed the vendors and they fixed them.
> http://www.cacert.at/cgi-bin/rngresults

Are you seriously saying that the entropy of FreeBSD /dev/random is 0?

-- 
http://www.apache-ssl.org/ben.html           http://www.links.org/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post