Steven M. Bellovin wrote:
On Sat, 24 May 2008 20:29:51 +0100
Ben Laurie <[EMAIL PROTECTED]> wrote:

Of course, we have now persuaded even the most stubborn OS that randomness matters, and most of them make it available, so perhaps
this concern is moot.

Though I would be interested to know how well they do it! I did have some input into the design for FreeBSD's, so I know it isn't
completely awful, but how do other OSes stack up?

I believe that all open source Unix-like systems have /dev/random
and /dev/urandom; Solaris does as well.


Yes, but with different semantics:

     /dev/urandom is a compatibility nod
     to Linux. On Linux, /dev/urandom will
     produce lower quality output if the
     entropy pool drains, while
     /dev/random will prefer to block and
     wait for additional entropy to be
     collected.  With Yarrow, this choice
     and distinction is not necessary,
     and the two devices behave
     identically. You may use either.

(random(4) from Mac OSX.)

Depending on where you are in the security paranoia equation, the differences matter little or a lot. If doing medium level security, it's fine to outsource the critical components to the OS, and accept any failings. If doing paranoid-level stuff, then best to implement ones own mix and just stir in the OS level offering. That way we reduce the surface area for lower-layer config attacks like the Debian adventure.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to