On Friday 23 August 2013 11:31:06 Vladimir 'φ-coder/phcoder' Serbinenko wrote:
> > There is a warning about random generator not being secure in
> > util/grub-mkpasswd-pbkdf2.c, which may be supressed by adding "&& !
> > defined (__OpenBSD__)" to the defines list.
>
> To do this we need a confirmation that reading from /dev/urandom is
> indeed the right way to access PRNG on OpenBSD and that it gives us
> cryptographically good random.
On OpenBSD, all random pseudo-devices (random, arandom, srandom, urandom)
provide cryptographically good random.
From the random(4) man page:
DESCRIPTION
The various random devices produce high quality random output data.
Entropy data is collected from system activity (like disk, network, and
clock device interrupts and such), and then run through various hash or
message digest functions to generate the output. All the random devices
are expected to provide high quality pseudo-random output data.
The arc4random(3) function in userland libraries seeds itself from this
device (or with the sysctl(3) interface), providing a second level of
ARC4 hashed data without the need to access these devices every time.
--
Ilya
_______________________________________________
Grub-devel mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/grub-devel