[39455] in bugtraq

home help back first fref pref prev next nref lref last post

Re: /dev/random is probably not

daemon@ATHENA.MIT.EDU (Alexey Toptygin)
Wed Jul 6 15:00:21 2005

Date: Wed, 6 Jul 2005 11:37:00 +0000 (UTC)
From: Alexey Toptygin <alexeyt@freeshell.org>
To: Jack Lloyd <lloyd@randombit.net>
Cc: bugtraq@securityfocus.com
In-Reply-To: <20050705164514.GG11643@randombit.net>
Message-ID: <Pine.NEB.4.62.0507061124220.4246@ukato.freeshell.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed

On Tue, 5 Jul 2005, Jack Lloyd wrote:

> Assuming the PRNG is any good, it shouldn't matter if an attacker can 
> manipulate such timings, because (by definition) a good PRNG will still 
> behave correctly even if an attacker does feed it lots of deliberately 
> bad data (as long as the PRNG also has been fed with a sufficient amount 
> of unguessable 'good' input as well, of course).

In the case of Linux, this still causes the estimate of how much 'good' 
entropy is in the pool to be inflated. Some applications may rely on the 
fact that /dev/random is backed by 'real' entropy, whereas /dev/urandom 
can be pure PRNG output.

IMO, all this discussion is well and good, but it would be much more 
productive for someone to settle the question empirically.

 			Alexey

home help back first fref pref prev next nref lref last post