FB_security 板


Ben Laurie writes: > > I can certainly trigger a reseed at will, but allowing external writes > > to overwhelm the system by doing a > > > > $ cat /dev/zero > /dev/random > > > > ... just ain't gonna happen. No, sir. > > Let's just quantify the risk here: essentially the problem is that if > I feed something with no entropy into the pool and that is allowed > to trigger a reseed, then you end up hashing what existing entropy > you have with the no-entropy input, leading to a loss of entropy. The > theoretical loss for a perfect hash function is log_2(N)log_2(1/e), > where N is the number of iterations. log_2(1/e) is ~.66. So, to reduce > the entropy from, say, 256 bits, if SHA-1 is used, to 128 bits, takes > ~2^(128/.66) reseeds - that is, ~2^193. Around 10^58. So, you're > right, it ain't gonna happen, even if you allow an attacker to reseed > as often as he wants :-) Fine, but that is not what I'm talking about, _AT_ALL_. Reseeds are expensive in kernel space; locking/unlocking and thread consumption are the issue. Right now, this is mitigated by reseeding at 10Hz. To allow reseeds to overwhelm the running kernel by pumping data into /dev/random is would be very silly indeed, and I'm not going to let that happen. > I do want to see the method :-) This is what I have so far; written, but neither tested nor finalised. Its not the complete picture; there are minor changes elsewhere. The intention is to reduce the number of calls to random_harvest_internal(). All entropy supplied by this method is assumed to be junk/hostile; anything that is supplied that is not so is a free gift. The TSC register is incorporated in random_harvest_internal(), so extras are added in to help out. random_yarrow_write(void *buf, int count) { /* This static buffer is uninitialised; this is deliberate. */ static uint8_t chunk[HARVESTSIZE]; static int chunk_pos = 0; union { uint64_t u64; uint8_t u8[sizeof(uint64_t)]; } fastcounter; int i; uint8_t *inbuf; /* * Accumulate the input into a HARVESTSIZE chunk. The writer has too * much control here, so "estimate" the entropy as zero. */ if (buf != NULL) { inbuf = buf; for (i = 0; i < count; i++) { chunk[chunk_pos] ^= inbuf[i]; chunk_pos = (chunk_pos + 1)%HARVESTSIZE; } fastcounter.u64 = get_cyclecount(); for (i = 0; i < sizeof(uint64_t); i++) { chunk[chunk_pos] ^= fastcounter.u8[i]; chunk_pos = (chunk_pos + 1)%HARVESTSIZE; } } else random_harvest_internal(get_cyclecount(), chunk, HARVESTSIZE, 0, 0, RANDOM_WRITE); } > My point here is that you don't have full control of the inputs > to /dev/random, so assuming that they take some particular form > seems like a mistake to me - the aim, I would hope, would be to > extract available entropy from whatever inputs you get, regardless of > quality. So, the argument against xor is that it is possible for a > careless/naive person to shoot themselves in the foot, and it would > be nice to avoid that - it seems unkind to assume that everyone who > wants to help the PRNG is going to be knowledgeable about its inner > workings. This conversation is being reset back 12+ years. *SIGH*. I get the distinct impression that I'm starting again from scratch here, and I'm not sure that I have either the energy or inclination to do that. Are you aware of Yarrow's approach to poor entropy while harvesting? M -- Mark R V Murray Cert APS(Open) Dip Phys(Open) BSc Open(Open) BSc(Hons)(Open) Pi: 132511160 _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草
伺服器连线错误,造成您的不便还请多多包涵!
「赞助商连结」






like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草

请输入看板名称,例如:iOS站内搜寻

TOP