Re: rc.d/postrandom

看板FB_security作者時間13年前 (2012/09/25 16:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串4/4 (看更多)
Ben Laurie <benl@freebsd.org> writes: > He means postrandom. Which deletes all saved entropy because of fear > of replay attacks. > > IMO, this doesn't make much sense - if you don't have sufficient fresh > entropy to mix into the pool, then deleting your saved entropy makes > you more vulnerable, not less. And if you do, you're not vulnerable > anyway. If the stored entropy is known to the attacker, you are mixing known data into the pool, which Yarrow is designed to withstand. You are no worse off than before. If both the current state of Yarrow and the stored entropy are known to the attacker, you are no worse off than before - you are equally screwed whether you use the stored entropy or not. If the current state of Yarrow is known to the attacker but the stored entropy isn't, you are better off with it than without it. Therefore, the stored entropy should only be deleted when we have something to replace it with. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1GOMm3qD (FB_security)
文章代碼(AID): #1GOMm3qD (FB_security)