[145543] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: init.d/urandom : saving random-seed

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Sun Aug 1 13:00:05 2010

Cc: Henrique de Moraes Holschuh <hmh@debian.org>,
 Petter Reinholdtsen <pere@hungry.com>,
 pkg-sysvinit-devel@lists.alioth.debian.org,
 Cryptography <cryptography@metzdowd.com>
From: Jerry Leichter <leichter@lrw.com>
To: John Denker <jsd@av8n.com>
In-Reply-To: <4C548965.1060702@av8n.com>
Date: Sun, 1 Aug 2010 00:00:39 -0400

On the question of what to do if we can't be sure the saved seed file  
might be reused:  Stir in the date and time and anything else that  
might vary - even if it's readily guessable/detectable - along with  
the seed file.  This adds minimal entropy, but detecting that a seed  
file has been re-used will be quite challenging.  A directed attack  
can probably succeed, but if you consider the case of a large number  
of nodes that reboot here and there and that, at random and not too  
often, re-use a seed file, then detecting those reboots with stale  
seed files seems like a rather hard problem.  (Detecting them  
*quickly* will be even harder, so active attacks - as opposed to  
passive attacks that can be made on recorded data - will probably be  
out of the question.)

I wouldn't recommend this for high-value security, but then if you're  
dealing with high-value information, there's really no excuse for not  
having and using a source of true random bits.
                                                         -- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post