[145505] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Persisting /dev/random state across reboots

daemon@ATHENA.MIT.EDU (Thierry Moreau)
Thu Jul 29 16:53:45 2010

Date: Thu, 29 Jul 2010 16:51:50 -0400
From: Thierry Moreau <thierry.moreau@connotech.com>
To: Richard Salz <rsalz@us.ibm.com>
CC: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <OFD5E803DB.7638E3CA-ON8525776F.006C7332-8525776F.006CABEB@us.ibm.com>

Richard Salz wrote:
> At shutdown, a process copies /dev/random to /var/random-seed which is 
> used on reboots.
> Is this a good, bad, or "shrug, whatever" idea?
> I suppose the idea is that "all startup procs look the same" ?
> 
> tnx.

First look at http://en.wikipedia.org/wiki/Urandom

There is a tremendous value in the Linux kernel technology, including 
extensive peer review from an IT security perspective.

If you think there are security requirements not met (e.g. assurance of 
entropy characteristics, assurance of implementation configuration 
sanity), then you should state your design goals. Only thereafter we get 
an understanding of good, bad, or more relevant: improved.

Regards,

-- 
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post