[prev in list] [next in list] [prev in thread] [next in thread] 

List:       freebsd-security
Subject:    Re: rc.d/postrandom
From:       Dag-Erling_Smørgrav <des () des ! no>
Date:       2012-09-25 8:21:07
Message-ID: 86zk4eqzrg.fsf () ds4 ! des ! no
[Download RAW message or body]

Ben Laurie <benl@freebsd.org> writes:
> He means postrandom. Which deletes all saved entropy because of fear
> of replay attacks.
>
> IMO, this doesn't make much sense - if you don't have sufficient fresh
> entropy to mix into the pool, then deleting your saved entropy makes
> you more vulnerable, not less. And if you do, you're not vulnerable
> anyway.

If the stored entropy is known to the attacker, you are mixing known
data into the pool, which Yarrow is designed to withstand.  You are no
worse off than before.

If both the current state of Yarrow and the stored entropy are known to
the attacker, you are no worse off than before - you are equally screwed
whether you use the stored entropy or not.

If the current state of Yarrow is known to the attacker but the stored
entropy isn't, you are better off with it than without it.

Therefore, the stored entropy should only be deleted when we have
something to replace it with.

DES
-- 
Dag-Erling Smørgrav - des@des.no
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic