13Jan2008 (UTC+ 8)

On 1/13/08, fooler mail <[EMAIL PROTECTED]> wrote:
[...]
> i wont recommend badblocks with -t random parameter for scrubbing your
> disk as it uses the C standard library random() function ... random()
> function uses a non-linear additive feedback random generator as this
> would easily for cryptanalyst to decrypt your data....

"Easy" is a relative term. I guess what you're trying to say is that
the random bits used by badblocks is "repeatable" given that the
srandom() seed is the current time of the machine (a 32-bit unsigned
integer in many cases, I think) --which further stresses the term
"psuedo" in PRNG.

So that translates to having the cryptanalyst first try to accurately
determine the exact system / hardware or NTP-based time when badblocks
was run, before trying to predict the sequence of the PRNG'ed bits
--and that's a lot of hard work! But after that, it's a walk in the
park against the srandom'ed HDD.

[...]
> /dev/urandom is a non-blocking state... it will not block waiting for
> other entropies to fill up the number of bits but instead uses its own
> algorithm with some value in the entropy pool to produce
> pseudo-randomness... but it will used that number of bits once it
> fills up...

I wonder if one can write to /dev/urandom while using /dev/zero as
input? He he he!!! That would screw up a lot of things.

I wish I can experiment write now (pun intended!) but it's a Sunday
and I'm at home, using my wife's Windows XP (on a just-say-no-to-Vista
laptop).


Drexx Laggui  -- CISA, CISSP, CFE Associate, CCSI, CSA
http://www.laggui.com  ( Singapore / Manila / California )
Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to