On Mon, May 2, 2022 at 11:37 AM Denys Vlasenko <vda.li...@googlemail.com> wrote:
>
> On Mon, May 2, 2022 at 8:26 AM Emmanuel Deloget <log...@free.fr> wrote:
> > Le lun. 2 mai 2022 à 03:31, Denys Vlasenko <vda.li...@googlemail.com> a 
> > écrit :
> > > > I beg to differ, and especially on some embedded systems where the RNG
> > > > might be quite controllable by an attacker from the outside (mostly 
> > > > because
> > > > it lacks a lot of entropy crediting inputs, which is exactly the reason 
> > > > why we
> > > > need seedrng in the first place). This may lead to catastrophic 
> > > > cryptography
> > > > failures down the road.
> > >
> > > Did you personally encounter such a situation?
> > > I'm not implying it's not really happening, I'm interested to hear
> > > from people who met this situation in real world.
> >
> > Hey :) We're now entering in the "cautionary tales" territory :)
> >
> > This happened, yes. We have not seen any exploitation of this in
> > nature

I've exploited nonce reuse before. It's a real thing. Also, captured,
stored, and later correlated network traffic is a real thing.

Stop playing fast and lose with the crypto here. And stop entertaining
these discussions where you reduce the security of a thing because of
random people on a mailing list spouting off nonsense.

Moreover, I'm shocked that you've continued to erode the security of
the software, without so much of a reply to me about it substantiating
your actions. For shame.

As we speak, that fsync(dfd) is still missing a check on its return value.

Just remove seedrng.c from busybox. You are clearly not a competent
steward of security sensitive software, and this is just going to lead
to bad things.

Thanks,
Jason
_______________________________________________
busybox mailing list
busybox@busybox.net
http://lists.busybox.net/mailman/listinfo/busybox

Reply via email to