Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

  The situation is _worse_; the entropy is minimal, and is _very_ attackable.
 
 What's wrong about timers for enthropy (I mean high resolution ones)?
 Really we need only few bytes of enthropy and can use them to seed RNG for the 
 first time if no true randomness available. To be joking: MD5 of kernel module 
 can help too :-)

getnanotime() is already extensively used; we just need to force the 
RNG to reseed once at the beginning. As soon as I'm happy that the
code is panic-free, I'll commit it.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

 The problem is that the randomdev stuff should be a delete option, ie. it 
 should be built as part of the kernel unless EXPLICITLY excluded, not the 
 wrong way around as it is at the moment.

I agree. Any objections?

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

 ssh-keygen should just block until it gets enough - this is not acceptable
 behaviour if /dev/urandom is returning unseeded data. OpenSSL uses
 /dev/urandom at the moment - I just read a comment in md_rand.c that using
 /dev/random may block, which I didn't think was true.
 
 On the other hand, doing a dd if=/dev/random of=/dev/null gives me
 infinite "randomness" at 10MB/sec - have the semantics of /dev/random
 changed?

Yes; remember that what we have here is Yarrow algorithm; which is an
algorithm for cryptographically secure PRNG - one whose internal state
is unguessable, or if compromised folr some reason is self-recovering.

"Infinite" randomness is possible with this algorithm.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Kris Kennaway

On Mon, 17 Jul 2000, Mark Murray wrote:

  On the other hand, doing a dd if=/dev/random of=/dev/null gives me
  infinite "randomness" at 10MB/sec - have the semantics of /dev/random
  changed?
 
 Yes; remember that what we have here is Yarrow algorithm; which is an
 algorithm for cryptographically secure PRNG - one whose internal state
 is unguessable, or if compromised folr some reason is self-recovering.
 
 "Infinite" randomness is possible with this algorithm.

On the other hand, didn't you say that at system boot the RNG is
essentially unseeded, so this is actually a liability because processes
cannot be sure they're getting real randomness.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

 On Mon, 17 Jul 2000, Mark Murray wrote:
 
   On the other hand, doing a dd if=/dev/random of=/dev/null gives me
   infinite "randomness" at 10MB/sec - have the semantics of /dev/random
   changed?
  
  Yes; remember that what we have here is Yarrow algorithm; which is an
  algorithm for cryptographically secure PRNG - one whose internal state
  is unguessable, or if compromised folr some reason is self-recovering.
  
  "Infinite" randomness is possible with this algorithm.
 
 On the other hand, didn't you say that at system boot the RNG is
 essentially unseeded, so this is actually a liability because processes
 cannot be sure they're getting real randomness.

Until you type or move the mouse. I'm putting the rest of the harvesting
calls in today.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

 In message [EMAIL PROTECTED], Mark Murray writes:
 
 getnanotime() is already extensively used; 
 
 I looked at that use, but as far as I can tell, it is only used as a
 flag at this time, the bits returned by getnanotime() does not end up
 in the entropy pool ?

Not true; struct entropy contains nanotime and the harvested entropy;
_both_ are hashed in the reseed operation.

 I'm not dissatisfied about that btw, the output from getnanotime()
 is not very random at all, unless you dive into the timecounter
 code to find out what the parameters are.

I agree that it is not (very) random; however cclock jitter and keystroke
timing can help thwart the bad guys...

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], Mark Murray writes:

getnanotime() is already extensively used; 

I looked at that use, but as far as I can tell, it is only used as a
flag at this time, the bits returned by getnanotime() does not end up
in the entropy pool ?

I'm not dissatisfied about that btw, the output from getnanotime()
is not very random at all, unless you dive into the timecounter
code to find out what the parameters are.

--
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Louis A. Mamakos

  In message [EMAIL PROTECTED], Mark Murray writes:
  
  getnanotime() is already extensively used; 
  
  I looked at that use, but as far as I can tell, it is only used as a
  flag at this time, the bits returned by getnanotime() does not end up
  in the entropy pool ?
 
 Not true; struct entropy contains nanotime and the harvested entropy;
 _both_ are hashed in the reseed operation.
 
  I'm not dissatisfied about that btw, the output from getnanotime()
  is not very random at all, unless you dive into the timecounter
  code to find out what the parameters are.
 
 I agree that it is not (very) random; however cclock jitter and keystroke
 timing can help thwart the bad guys...

But do please keep in mind that many of my FreeBSD platforms have neither
keyboard or mouse.  And for the ones that do, they tend not to get used
until long after the system boots.  It's essential that the randomness
harvesting also be driven off of other events, such as network interface
or storage system interrupts for these environments.

In fact, it would be rather interesting to have a configuration flag which
always forces something like an fsck on a file system in order to provide
some entropy to the random device.  Or some other user-exposed way of
providing entropy.  I might have some data on disk, or some network
operations which can be performed to help seed the entropy pool.

louie



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], "Louis A. Mamakos" writ
es:

In fact, it would be rather interesting to have a configuration flag which
always forces something like an fsck on a file system in order to provide
some entropy to the random device.  Or some other user-exposed way of
providing entropy.  I might have some data on disk, or some network
operations which can be performed to help seed the entropy pool.

What we really need is this:

fetch -o http://entropy.freebsd.org/  /dev/random

with a bunch of volounteers providing random bits to people in need.

I have thought about adding a entropy server to my array of weird
servers in my lab.  Something like a Geiger counter and a smokedetector
could do wonders.

--
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Alexander Langer

Thus spake Poul-Henning Kamp ([EMAIL PROTECTED]):

 I have thought about adding a entropy server to my array of weird
 servers in my lab.  Something like a Geiger counter and a smokedetector
 could do wonders.

HA! Cool!

Do that please!

I mean, seriously.
And an option to sysinstall, where you can enable this as you can with
ntpdate :)

Alex

-- 
cat: /home/alex/.sig: No such file or directory


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], Alexander Langer writ
es:
Thus spake Poul-Henning Kamp ([EMAIL PROTECTED]):

 I have thought about adding a entropy server to my array of weird
 servers in my lab.  Something like a Geiger counter and a smokedetector
 could do wonders.

HA! Cool!

Do that please!

I mean, seriously.
And an option to sysinstall, where you can enable this as you can with
ntpdate :)

DuH!

NTP is the perfect way to gather entropy at bootup!

Predicting the clock's offset from reality and the two way path to
the server of choice is impossible, plus if people enable authentication
later on the packets will be choke full of high-quality entropy.

We need an enterprising soul to add an option (default on) to
ntpdate to write the received packets in toto to /dev/random
if it exists.

If somebody does this, I will spear-head the effort of getting it
into the ntpv4 sources (Hmm, don't  I have a commit bit there
already ?  Can't remember...)

--
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Alexander Langer

Thus spake Poul-Henning Kamp ([EMAIL PROTECTED]):

 We need an enterprising soul to add an option (default on) to
 ntpdate to write the received packets in toto to /dev/random
 if it exists.

If noone else wants to do it, I could take a look at it.
Little time, though.

Alex

-- 
cat: /home/alex/.sig: No such file or directory


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Steve O'Hara-Smith


On 17-Jul-00 Poul-Henning Kamp wrote:
 NTP is the perfect way to gather entropy at bootup!

Only if in reach of an NTP server ?

--
Steve O'Hara-Smith [EMAIL PROTECTED]

http://sohara.webhop.net/ A Better Way To Focus The Sun


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], "Steve O'Hara-Smith" writes
:

On 17-Jul-00 Poul-Henning Kamp wrote:
 NTP is the perfect way to gather entropy at bootup!

Only if in reach of an NTP server ?

Obviously :-)

--
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: MFS complains that no vop_getwritemount operation(?)

2000-07-17 Thread Sheldon Hearn



On Sun, 16 Jul 2000 01:11:16 +0900, Makoto MATSUSHITA wrote:

 Jul 16 00:48:32 martini /kernel: mfs_badop[vop_getwritemount]
 Jul 16 00:48:32 martini /kernel: mfs_badop[vop_getwritemount] = 45
 
 I'm using MFS as /tmp filesystem, and this message shows up if I
 access to /tmp directory such as create a file/directory.
 
 Following patch seems to shut up my kernel, but I dunno it is the
 right fix for this problem (I've got a hint from ../ufs/ufs_vnops.c).

Have you sent your patch to Kirk McKusick [EMAIL PROTECTED]?

 Does anyone can reproduce mfs_badop[vop_getwritemount] warnings ?

Yes, I got them until I switched to a malloc(9)-backed md(4) device.
They seemed harmless.

Ciao,
Sheldon.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: mfs_badop...

2000-07-17 Thread Sheldon Hearn



On Sun, 16 Jul 2000 18:41:08 MST, Matthew Jacob wrote:

 any reason that we should be seeing these now:
 
 mfs_badop[vop_getwritemount]
 mfs_badop[vop_getwritemount] = 45

I suspect that these relate to the import of ffs snapshots.  I've mailed
Kirk, and someone else has posted a tentative patch to this list.

Ciao,
Sheldon.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: MFS complains that no vop_getwritemount operation(?)

2000-07-17 Thread Makoto MATSUSHITA


sheldonh Have you sent your patch to Kirk McKusick [EMAIL PROTECTED]?

No, not yet. It seems that this change is incoroprated with FFS
snapshots feature, but I cannot decide it's true or not; other
filesystem are modified also (see commitlogs), but mfs is not changed...

Anyway, I'll try to email later.

-- -
Makoto `MAR' MATSUSHITA


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

  I agree that it is not (very) random; however cclock jitter and keystroke
  timing can help thwart the bad guys...
 
 But do please keep in mind that many of my FreeBSD platforms have neither
 keyboard or mouse.  And for the ones that do, they tend not to get used
 until long after the system boots.  It's essential that the randomness
 harvesting also be driven off of other events, such as network interface
 or storage system interrupts for these environments.

Agreed. I have already committed a "persistent" entropy cache that
reseeds the random device on reboot.

 In fact, it would be rather interesting to have a configuration flag which
 always forces something like an fsck on a file system in order to provide
 some entropy to the random device.  Or some other user-exposed way of
 providing entropy.  I might have some data on disk, or some network
 operations which can be performed to help seed the entropy pool.

I'm (er, phk is) looking at hooking namei() in some way.

I'm also going to hook the networking stack.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

 What we really need is this:
 
   fetch -o http://entropy.freebsd.org/  /dev/random

For this to work, you'll need to encrypt the traffic.

fetch -o https://entropy.freebsd.org/  /dev/random
 ^

If the world knows what they are, your bits aren't random enough.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Maxim Sobolev

Mark Murray wrote:

   I agree that it is not (very) random; however cclock jitter and keystroke
   timing can help thwart the bad guys...
 
  But do please keep in mind that many of my FreeBSD platforms have neither
  keyboard or mouse.  And for the ones that do, they tend not to get used
  until long after the system boots.  It's essential that the randomness
  harvesting also be driven off of other events, such as network interface
  or storage system interrupts for these environments.

 Agreed. I have already committed a "persistent" entropy cache that
 reseeds the random device on reboot.


You may also want to extend /etc/crontab to periodically save entropy. This would
help if something unexpected like halt(8) or panic(9) happened.

-Maxim






To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Leif Neland



On Mon, 17 Jul 2000, Steve O'Hara-Smith wrote:

 
 On 17-Jul-00 Poul-Henning Kamp wrote:
  NTP is the perfect way to gather entropy at bootup!
 
 Only if in reach of an NTP server ?
 
If you can't reach a NTP server, you are not connected to the internet. In
that case you don't need to worry so much about security...

Leif



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Steve O'Hara-Smith


On 17-Jul-00 Leif Neland wrote:
 If you can't reach a NTP server, you are not connected to the internet. In
 that case you don't need to worry so much about security...

Not clear. I might not be connected at boot time but could well become
connected later.

--
Steve O'Hara-Smith [EMAIL PROTECTED]

http://sohara.webhop.net/ A Better Way To Focus The Sun


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



world breakage in -current (also breaks release)

2000-07-17 Thread Jordan K. Hubbard

cd /usr/src; make -f Makefile.inc1 hierarchy
cd /usr/src/etc;make distrib-dirs
mtree -deLU -f /usr/src/etc/mtree/BSD.root.dist -p /
mtree: illegal option -- L
usage: mtree [-cdeinrUux] [-f spec] [-K key] [-k key] [-p path] [-s seed]
[-X excludes]
*** Error code 1


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



New mtree needed for installation

2000-07-17 Thread Samuel Tardieu

I did a "make buildworld" then "make installworld", and:

--
 Making hierarchy
--
cd /usr/src; make -f Makefile.inc1 hierarchy
cd /usr/src/etc;make distrib-dirs
mtree -deLU -f /usr/src/etc/mtree/BSD.root.dist -p /
mtree: illegal option -- L
usage: mtree [-cdeinrUux] [-f spec] [-K key] [-k key] [-p path] [-s seed]
[-X excludes]
*** Error code 1

Of course, installing the new mtree first solves this, but it may be
worth a note in UPDATING (or better, use the newly built mtree or do
not require the use of the new -L option).

  Sam
-- 
Samuel Tardieu -- [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



ftpd 550 reply

2000-07-17 Thread Dag-Erling Smorgrav

Does anyone else than me have trouble with ftpd reporting "550 not a
plain file" instead of "550 no such file or directory" when the
requested file does not exist?

DES
-- 
Dag-Erling Smorgrav - [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Steve Kargl

Maxim Sobolev wrote:
[Charset koi8-r unsupported, filtering to ASCII...]
 Mark Murray wrote:
 
  Agreed. I have already committed a "persistent" entropy cache that
  reseeds the random device on reboot.
 
 You may also want to extend /etc/crontab to periodically save entropy.
 This would help if something unexpected like halt(8) or panic(9) happened.
 

I thought about a reseed daemon periodically saving entropy to, say,
/var/log/entropy.  But, a crontab entry would work just as well.

-- 
Steve


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Brandon D. Valentine

On Mon, 17 Jul 2000, Steve O'Hara-Smith wrote:


On 17-Jul-00 Leif Neland wrote:
 If you can't reach a NTP server, you are not connected to the internet. In
 that case you don't need to worry so much about security...

Not clear. I might not be connected at boot time but could well become
connected later.

[Why do so few people manage the RFC compliant space in their .sig?
i.e. "-- "]

But by then you've already booted and other events have generated some
entropy for the random device.  You no longer need seeding.

Brandon D. Valentine
-- 
bandix at looksharp.net  |  bandix at structbio.vanderbilt.edu
"Truth suffers from too much analysis." -- Ancient Fremen Saying



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: world breakage in -current (also breaks release)

2000-07-17 Thread Eric Jacoboni

 "Jordan" == Jordan K Hubbard [EMAIL PROTECTED] writes:

Jordan cd /usr/src; make -f Makefile.inc1 hierarchy
Jordan cd /usr/src/etc;make distrib-dirs
Jordan mtree -deLU -f /usr/src/etc/mtree/BSD.root.dist -p /
Jordan mtree: illegal option -- L

Yep, same for me... I succeed in installing mtree _before_ making
installworld.

-- 
-
Éric Jacoboni   « No sport, cigars! »  (W. Churchill)
-


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Alexander Langer

Thus spake Leif Neland ([EMAIL PROTECTED]):

 If you can't reach a NTP server, you are not connected to the internet. In
 that case you don't need to worry so much about security...

That is wrong :)

Alex

-- 
cat: /home/alex/.sig: No such file or directory


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: New mtree needed for installation

2000-07-17 Thread Ruslan Ermilov

On Mon, Jul 17, 2000 at 05:39:12PM +0200, Samuel Tardieu wrote:
 I did a "make buildworld" then "make installworld", and:
 
 --
  Making hierarchy
 --
 cd /usr/src; make -f Makefile.inc1 hierarchy
 cd /usr/src/etc;make distrib-dirs
 mtree -deLU -f /usr/src/etc/mtree/BSD.root.dist -p /
 mtree: illegal option -- L
 usage: mtree [-cdeinrUux] [-f spec] [-K key] [-k key] [-p path] [-s seed]
 [-X excludes]
 *** Error code 1
 
 Of course, installing the new mtree first solves this, but it may be
 worth a note in UPDATING (or better, use the newly built mtree or do
 not require the use of the new -L option).
 
It is a known problem, and Marcel Moolenaar [EMAIL PROTECTED] has posted
a patch to -committers for a review.


-- 
Ruslan Ermilov  Oracle Developer/DBA,
[EMAIL PROTECTED]   Sunbay Software AG,
[EMAIL PROTECTED]  FreeBSD committer,
+380.652.512.251Simferopol, Ukraine

http://www.FreeBSD.org  The Power To Serve
http://www.oracle.com   Enabling The Information Age


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ftpd 550 reply

2000-07-17 Thread Ruslan Ermilov

On Mon, Jul 17, 2000 at 06:18:39PM +0200, Dag-Erling Smorgrav wrote:
 Does anyone else than me have trouble with ftpd reporting "550 not a
 plain file" instead of "550 no such file or directory" when the
 requested file does not exist?
 
This is on 4.1-RC (built from today's sources which equivalent to
-CURRENT):

Script started on Mon Jul 17 20:01:30 2000
Connected to localhost.
220 perl.sunbay.crimea.ua FTP server (Version 6.00LS) ready.
Name (localhost:ru): 
331 Password required for ru.
Password:
230 User ru logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp get foo
local: foo remote: foo
550 foo: No such file or directory.
ftp by
221 Goodbye.

Script done on Mon Jul 17 20:01:38 2000

-- 
Ruslan Ermilov  Oracle Developer/DBA,
[EMAIL PROTECTED]   Sunbay Software AG,
[EMAIL PROTECTED]  FreeBSD committer,
+380.652.512.251Simferopol, Ukraine

http://www.FreeBSD.org  The Power To Serve
http://www.oracle.com   Enabling The Information Age


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



fetch(1) bug?

2000-07-17 Thread Akinori -Aki- MUSHA

Hi, I found a weird problem with your new fetch(1).

Please try fetching the following file with both fetch and wget for
comparison:

http://www.hiei.kit.ac.jp/~hitomi/mutt/mutt/manual_ja-1.2i-0.tar.gz


1) Fetching the file with wget

knu@archon[2]% uname -a   ~
FreeBSD archon.local.idaemons.org 5.0-CURRENT FreeBSD 5.0-CURRENT #36: Sun Jul 16 
21:17:50 JST 2000 [EMAIL PROTECTED]:/usr/src/sys/compile/ARCHON  i386
knu@archon[2]% wget http://www.hiei.kit.ac.jp/~hitomi/mutt/manual_ja-1.2i-0.tar.gz
--02:01:36--  http://www.hiei.kit.ac.jp:80/%7Ehitomi/mutt/manual_ja-1.2i-0.tar.gz
   = `manual_ja-1.2i-0.tar.gz.1'
Connecting to www.hiei.kit.ac.jp:80... connected!
HTTP request sent, awaiting response... 200 OK
Length: 262,692 [application/x-gzip]

0K - .. .. .. .. .. [ 19%]
   50K - .. .. .. .. .. [ 38%]
  100K - .. .. .. .. .. [ 58%]
  150K - .. .. .. .. .. [ 77%]
  200K - .. .. .. .. .. [ 97%]
  250K - .. [100%]

02:01:44 (33.20 KB/s) - `manual_ja-1.2i-0.tar.gz.1' saved [262692/262692]

knu@archon[2]% ls -l manual_ja-1.2i-0.tar.gz  ~
-rw-r--r--  1 knu  knu  - 262692 Jul  6 09:06 manual_ja-1.2i-0.tar.gz
knu@archon[2]% md5 manual_ja-1.2i-0.tar.gz~
MD5 (manual_ja-1.2i-0.tar.gz) = 809121b8baa58906fba7422de9c2b236
knu@archon[2]% tar ztf manual_ja-1.2i-0.tar.gz~
manual_ja.sgml
manual_ja.tex
manual_ja.txt
manual_ja.html


Seems fine.


2) Fetching the file with fetch

knu@archon[2]% fetch -vv http://www.hiei.kit.ac.jp/~hitomi/mutt/manual_ja-1.2i-0.tar.gz
looking up www.hiei.kit.ac.jp
connecting to www.hiei.kit.ac.jp:80
requesting http://www.hiei.kit.ac.jp:80/~hitomi/mutt/manual_ja-1.2i-0.tar.gz
looking up www.hiei.kit.ac.jp
connecting to www.hiei.kit.ac.jp:80
requesting http://www.hiei.kit.ac.jp:80/~hitomi/mutt/manual_ja-1.2i-0.tar.gz
Receiving manual_ja-1.2i-0.tar.gz: 262697 bytes
262697 bytes transferred in 7.7 seconds (33.16 kBps)
knu@archon[2]% md5 manual_ja-1.2i-0.tar.gz~
MD5 (manual_ja-1.2i-0.tar.gz) = 3b078418a5fdcc765d8bea0fed3ee6dd
knu@archon[2]% ls -l manual_ja-1.2i-0.tar.gz  ~
-rw-r--r--  1 knu  knu  - 262697 Jul  6 09:06 manual_ja-1.2i-0.tar.gz
knu@archon[2]% tar ztf manual_ja-1.2i-0.tar.gz~
manual_ja.sgml
manual_ja.tex
manual_ja.txt
manual_ja.html

gzip: stdin: decompression OK, trailing garbage ignored
tar: child returned status 2


Hmm, fetch(1) seems receiving extra 5 bytes of garbage.


Have you got a clue?

-- 
   /
  /__  __   
 / )  )  ) )  /
Akinori -Aki- MUSHA aka / (_ /  ( (__(  @ idaemons.org / FreeBSD.org

"We're only at home when we're on the run, on the wing, on the fly"


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: dc driver and underruns (was: Strangeness with 4.0-S)

2000-07-17 Thread Rodney W. Grimes

...
 As far as I can tell the fxp driver doesn't even use the tx_fifo in the
 825xxx chips :-)
 
The 82557-9 have a 2KB internal buffer for transmits. They don't start
 transmitting until a programmed threshold is reached - this is to insure
 that PCI bus latency doesn't result in the transmitter getting stalled.
 The fxp driver starts out with this threshold set at 512 bytes, but will
 increase it (512 bytes at a time) when a DMA underrun occurs. Of course
 once the threshold reached 1536, then an entire 1500 byte packet is DMA'd
 into the buffer before the transmit begins.

Can you point me to the part of if_fxp.c that does this, as alls I can find
about any form of fifo in the code are these references:

Guardian# grep -i fifo *fxp*
if_fxp.c:   cbp-rx_fifo_limit =8;  /* rx fifo threshold (32 bytes) */
if_fxp.c:   cbp-tx_fifo_limit =0;  /* tx fifo threshold (0 bytes) */
if_fxpreg.h:volatile u_int  rx_fifo_limit:4,
if_fxpreg.h:tx_fifo_limit:3,

No place do I find anything that does any adjustments to these values :-(.

-- 
Rod Grimes - KD7CAX @ CN85sl - (RWG25)   [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



nic cards

2000-07-17 Thread Tony Johnson

One thing that I just noticed on the python mailing list is a portable way 
of retrieving an ip addy.  Why not start using eth0 (unfortunately as they 
do in Linuxland) eth1 ... For nic cards instead of fxp0 for an intel, 
etc...

The fxp0 way is too hardware and implementation dependant.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: nic cards

2000-07-17 Thread Chris Costello

On Monday, July 17, 2000, Tony Johnson wrote:
 One thing that I just noticed on the python mailing list is a portable way 
 of retrieving an ip addy.  Why not start using eth0 (unfortunately as they 
 do in Linuxland) eth1 ... For nic cards instead of fxp0 for an intel, 
 etc...
 
 The fxp0 way is too hardware and implementation dependant.

   ``eth0'' is no more portable than ``fxp0''.  Just because
Linux does it doesn't mean it's standard or portable.

-- 
|Chris Costello [EMAIL PROTECTED]
|MIPS:  Meaningless Indicator of Processor Speed.
`


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



rc.shutdown hook is not a solution (was Re: randomdev entropy gathering is really weak)

2000-07-17 Thread Andrey A. Chernov

On Mon, Jul 17, 2000 at 07:02:50PM +0200, Alexander Langer wrote:
 Thus spake Leif Neland ([EMAIL PROTECTED]):
 
  If you can't reach a NTP server, you are not connected to the internet. In
  that case you don't need to worry so much about security...
 
 That is wrong :)
 


The reason is not security only, the reason is buggy RNG.  Imagine diskless 
keyboard-less and mouse-less slide-show machine with no rc.shutdown hooks 
since it comes with power up and goes down with power down.  This machine 
will always start with same picture because RNG have not enough enthropy.  In 
worst case we should relay only on processor registers always present, i.e.  
timers and so on.  rc.shutdown hook not solve problem completely.

-- 
Andrey A. Chernov
[EMAIL PROTECTED]
http://ache.pp.ru/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Mark Murray

 You may also want to extend /etc/crontab to periodically save entropy. This would
 help if something unexpected like halt(8) or panic(9) happened.

That is an idea I can use! :-)

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: nic cards

2000-07-17 Thread Mike Smith

 One thing that I just noticed on the python mailing list is a portable way 
 of retrieving an ip addy.  Why not start using eth0 (unfortunately as they 
 do in Linuxland) eth1 ... For nic cards instead of fxp0 for an intel, 
 etc...
 
 The fxp0 way is too hardware and implementation dependant.

'ethX' is also too 'specific'.  Use 'ifconfig -l' to get a list of 
network interfaces, at which point you don't care what they're called...

-- 
... every activity meets with opposition, everyone who acts has his
rivals and unfortunately opponents also.  But not because people want
to be opponents, rather because the tasks and relationships force
people to take different points of view.  [Dr. Fritz Todt]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: fetch(1) bug?

2000-07-17 Thread Akinori -Aki- MUSHA

Sorry, I seem to have supplied a wrong URL.  Here's the correct one.

http://www.hiei.kit.ac.jp/~hitomi/mutt/manual_ja-1.2i-0.tar.gz

-- 
   /
  /__  __   
 / )  )  ) )  /
Akinori -Aki- MUSHA aka / (_ /  ( (__(  @ idaemons.org / FreeBSD.org

"We're only at home when we're on the run, on the wing, on the fly"


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



MS CHAP v2 in -current?

2000-07-17 Thread Michael Lucas

Ping...

Does anyone know if ms chap v2 will be integrated into -current any
time soon?  I need it for pptpclient.

If anyone has any patches they'd like public testing on, I'll volunteer.  :)

==ml


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: rc.shutdown hook is not a solution (was Re: randomdev entropy gathering is really weak)

2000-07-17 Thread Mark Murray

 The reason is not security only, the reason is buggy RNG.  Imagine diskless 
 keyboard-less and mouse-less slide-show machine with no rc.shutdown hooks 
 since it comes with power up and goes down with power down.  This machine 
 will always start with same picture because RNG have not enough enthropy.  In
 worst case we should relay only on processor registers always present, i.e.  
 timers and so on.  rc.shutdown hook not solve problem completely.

Actually, it is only a faulty reseed mechanism.

For the purposes of your argument above, the time-of-day would be
an acceptable reseed to random(9).

For cryptographic randomness, more noise is needed.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Sheldon Hearn



On Mon, 17 Jul 2000 19:33:40 +0200, Mark Murray wrote:

 That is an idea I can use! :-)

See the recently fixed and documented crontab(5) @reboot, in fact. :-)

Ciao,
Sheldon.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Alex Kapranoff

On Mon, Jul 17, 2000 at 05:08:35PM +0200, Leif Neland wrote:
 On Mon, 17 Jul 2000, Steve O'Hara-Smith wrote:
  On 17-Jul-00 Poul-Henning Kamp wrote:
   NTP is the perfect way to gather entropy at bootup!
  
  Only if in reach of an NTP server ?
  
 If you can't reach a NTP server, you are not connected to the internet. In
 that case you don't need to worry so much about security...

  Flawed logic. That's cryptography. It's about information
protection. And you of course know that about 80% of computer crimes
are commited by local cow orkers in a LAN environment behind a twenty
five firewalls, proxies and the like.

-- 
Alex Kapranoff,
2:50/383.20@fidonet,
Voice: +7(0832)791845.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Kris Kennaway

On Mon, 17 Jul 2000, Mark Murray wrote:

  What we really need is this:
  
  fetch -o http://entropy.freebsd.org/  /dev/random
 
 For this to work, you'll need to encrypt the traffic.
 
 fetch -o https://entropy.freebsd.org/  /dev/random
  ^
 
 If the world knows what they are, your bits aren't random enough.

Plus you need to authenticate (and obviously trust) your entropy server
and the data stream to make sure they're not actually someone else feeding
you zeros.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ftpd 550 reply

2000-07-17 Thread Dag-Erling Smorgrav

Ruslan Ermilov [EMAIL PROTECTED] writes:
 On Mon, Jul 17, 2000 at 06:18:39PM +0200, Dag-Erling Smorgrav wrote:
  Does anyone else than me have trouble with ftpd reporting "550 not a
  plain file" instead of "550 no such file or directory" when the
  requested file does not exist?
 This is on 4.1-RC (built from today's sources which equivalent to
 -CURRENT):
 [doesn't have the bug]

--- ftp.ofug.org:21
 220 flood.ping.uio.no FTP server (Version 6.00) ready.
 USER ftp
 331 Guest login ok, send your email address as password.
 PASS [EMAIL PROTECTED]
 230- 
 230- *  *
 230- * Welcome to flood.ping.uio.no!*
 230- *  *
 230- * All transfers are logged. If you are not comfortable *
 230- * with that, please find another server.   *
 230- *  *
 230- * Please report any problems or irregularities to  *
 230- * [EMAIL PROTECTED] *
 230- *  *
 230- 
 230 Guest login ok, access restrictions apply.
 TYPE I
 200 Type set to I.
 CWD /pub/FreeBSD/ports/distfiles
 250 CWD command successful.
 SIZE shorten.tar.gz
 550 shorten.tar.gz: not a plain file.
fetch: File unavailable (e.g., file not found, no access)

--- ftp.freebsd.org:21
 220 sourcerer.freesoftware.com FTP server (Version DG-3.1.42 Thu Jul 6 14:10:01 
PDT 2000) ready.
 USER ftp
 331 Guest login ok, send your email address as password.
 PASS [EMAIL PROTECTED]
 230-Welcome to ftp.freesoftware.com - home FTP site for Walnut Creek CDROM.
 230-There are currently 744 users out of 5000 possible.
 230-
 230-Most of the files in this area are also available on CDROM.  You can send
 230-email to [EMAIL PROTECTED] for more information or to order, or visit our Web
 230-site at http://www.wccdrom.com.  For tech support about our products, please
 230-email [EMAIL PROTECTED]  You may also call our toll-free number:
 230-1-800-786-9907 or +1-925-674-0783.  Please keep in mind that we only offer
 230-technical support for our CDROM products and not for the files on our
 230-FTP server.
 230-
 230-This server is a Xeon/550 with 4GB of memory  400GB of RAID 5 storage.
 230-The operating system is FreeBSD. Should you wish to get your own copy of
 230-FreeBSD, see the pub/FreeBSD directory or visit http://www.freebsd.org
 230-for more information.  FreeBSD on CDROM can be ordered using the WEB at
 230-http://www.wccdrom.com/titles/freebsd/freebsd.phtml or by sending email
 230-to [EMAIL PROTECTED]
 230-
 230-Gigabit colocation services provided by Lightning Internet. For more
 230-information, please visit http://www.lightning.net.
 230-
 230-Please send mail to [EMAIL PROTECTED] if you experience any
 230-problems.  Please also let us know if there is something we don't have that
 230-you think we should!
 230-
 230 Guest login ok, access restrictions apply.
 TYPE I
 200 Type set to I.
 CWD /pub/FreeBSD/ports/distfiles
 250 CWD command successful.
 SIZE shorten.tar.gz
 550 shorten.tar.gz: not a plain file.
fetch: File unavailable (e.g., file not found, no access)

--- ftp.kiarchive.ru:21
 220 kiarchive.relcom.ru FTP server (Version 6.00) ready.
 USER ftp
 331 Guest login ok, send your email address as password.
 PASS [EMAIL PROTECTED]
 230 Guest login ok, access restrictions apply.
 TYPE I
 200 Type set to I.
 CWD /pub/misc/hardware/soundcard/gus
 250 CWD command successful.
 SIZE timidity-0.2i.tar.gz
 550 timidity-0.2i.tar.gz: not a plain file.

DES
-- 
Dag-Erling Smorgrav - [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



No /boot/loader

2000-07-17 Thread Doug Barton

No response to this on -stable. The actual error message is:

Disk error 0x1 (lba=0x7004c)
No /boot/loader

Also, on a whim I decided to try running /boot/loader. I got a
message saying that there was a syntax error on line 4, that it was
missing either a close paren or a close curly brace. It went by fast, and
I couldn't reproduce it. A quick examination of the sources by my boot
code inexpert eyes didn't reveal anything that looked relevant on any line
4's. 

Doug
-- 
"Live free or die"
- State motto of my ancestral homeland, New Hampshire

Do YOU Yahoo!?


-- Forwarded message --
Date: Fri, 14 Jul 2000 20:30:48 -0700 (PDT)
From: Doug Barton [EMAIL PROTECTED]
Subject: Re: CFT: boot patch for 4.x

I'm having a problem that isn't related to your patch, but that
I'm hoping you or someone can shed some light on. I installed 4-Stable
from the 7/6 snapshot onto some shiny new machines, and when I reboot them
I get an error:

See above.

then the boot: prompt comes up a couple of times, it finds the kerrnel and
boots anyway. I found this odd because there clearly IS a /boot/loader,
and I haven't changed anything in /boot at all. I did a make world today
and installed a custom kernel, no joy. I'm also getting the dreaded
top: nlist failed error. 

I have the following for adapters:

ahc0: Adaptec aic7896/97 Ultra2 SCSI adapter port 0x2000-0x20ff mem
0xf410-0xf4100fff irq 19 at d
evice 12.0 on pci0
ahc0: aic7896/97 Wide Channel A, SCSI Id=7, 16/255 SCBs
ahc1: Adaptec aic7896/97 Ultra2 SCSI adapter port 0x2400-0x24ff mem
0xf4101000-0xf4101fff irq 19 at d
evice 12.1 on pci0
ahc1: aic7896/97 Wide Channel B, SCSI Id=7, 16/255 SCBs

and this for disks:

da0 at ahc0 bus 0 target 0 lun 0
da0: QUANTUM ATLAS_V__9_SCA 0200 Fixed Direct Access SCSI-3 device 
da0: 80.000MB/s transfers (40.000MHz, offset 63, 16bit), Tagged Queueing
Enabled
da0: 8755MB (17930694 512 byte sectors: 255H 63S/T 1116C)
da1 at ahc0 bus 0 target 1 lun 0
da1: QUANTUM ATLAS_V__9_SCA 0200 Fixed Direct Access SCSI-3 device 
da1: 80.000MB/s transfers (40.000MHz, offset 63, 16bit), Tagged Queueing
Enabled
da1: 8755MB (17930694 512 byte sectors: 255H 63S/T 1116C)

I did the install with dangerously dedicated disks, which I know John is
not a big fan of, but on the IBM SCSI drives I have in the other machines
I have no problems of this sort whatsoever. I suppose I could try the
install again with a real partition table, I just hate to waste all that
config time. :-/

Any help appreciated.

Doug
-- 
"Live free or die"
- State motto of my ancestral homeland, New Hampshire

Do YOU Yahoo!?




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-stable" in the body of the message



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Kurt D. Zeilenga

Note that there should be no need to cron the job.  You
only need to save one set of bits to be used as a seed
for the next startup.  And one set of bits SHOULD be
as good as any other.

I suggest you (at boot time):
1:  open seed file for read
unlink seed file
use seed file + available entropy to seed algorithm
close the seed file

2:  open for seed file for write
write X bytes for next time
close file

Note that even if you do cron step 2, I recommend highly you
mix in whatever entropy you can gather at boot time into
the initial seeding.  This will ensure any reuse of the
seed file (such as if you crash between steps 1 and 2) will
result in different bit sequences.

Regards, Kurt


At 10:14 PM 7/17/00 +0200, Sheldon Hearn wrote:


On Mon, 17 Jul 2000 19:33:40 +0200, Mark Murray wrote:

 That is an idea I can use! :-)

See the recently fixed and documented crontab(5) @reboot, in fact. :-)

Ciao,
Sheldon.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread George Michaelson


However much I love the idea of people coding in more randomness, I'd get a
better fuzzy feeling if somebody with some cred in the crypto world was sitting
in on this discussion and commenting on the ideas.

Things like 'going out on the network and fetching some random bits via http'
are so utterly bogus (open to attack, presume networks are there) that they
kinda suggest this hasn't been well thought out. Likewise embedding a
dependency on keyboard/mouse movements. IIRC There have been articles making it
plain that week initial random settings propagate out like topsy: you can't
add trustable randomness by taking skewed input sources.

People like Bruce Schneier, Steve Bellovin, they are not unapproachable. Could
somebody mail them for comments on whats considered acceptable sources of
random bits?

Please?

-George
--
George Michaelson |  DSTC Pty Ltd
Email: [EMAIL PROTECTED]|  University of Qld 4072
Phone: +61 7 3365 4310|  Australia
  Fax: +61 7 3365 4311|  http://www.dstc.edu.au




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



cer/b7b/pfc - pem

2000-07-17 Thread Leif Neland

Apropos pseudorandom, ssh etc; I hope this is not too off-topic, or can
somebody point in the right direction:

I have a Verisign personal certificate (Look me up at Verisign, as Leif
Neland)

This works nicely in Windows (Outlook Express), but I'd like to try using
the same key with openssl to generate crypted (to myself) or signed
messages.

I can export the key as a .cer, .p7b or .pfx, but openssl seems to want it
in .pem format.

Am I totally confused, or is it possible to convert one of the above to
.pem?

Leif





To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: cer/b7b/pfc - pem

2000-07-17 Thread Daniel Berlin+list.freebsd-current

"Leif Neland" [EMAIL PROTECTED] writes:

 Apropos pseudorandom, ssh etc; I hope this is not too off-topic, or can
 somebody point in the right direction:
 
 I have a Verisign personal certificate (Look me up at Verisign, as Leif
 Neland)
 
 This works nicely in Windows (Outlook Express), but I'd like to try using
 the same key with openssl to generate crypted (to myself) or signed
 messages.
 
 I can export the key as a .cer, .p7b or .pfx, but openssl seems to want it
 in .pem format.
 

What does the p7b file look like?

And the .cer file, and the .pfx file?

Are any of them ascii, with a "BEGIN PKCS7" or "BEGIN CERTIFICATE"
line?

 Am I totally confused, or is it possible to convert one of the above to
 .pem?
 
from crl2pkcs7's man page, in the notes section:

   The output file is a PKCS#7 signed data structure
   containing no signers and just certificates and an
   optional CRL.

   This utility can be used to send certificates and CAs to
   Netscape as part of the certificate enrollment process.
   This involves sending the DER encoded output as MIME type
   application/x-x509-user-cert.

   The PEM encoded form with the header and footer lines
   removed can be used to install user certificates and CAs
   in MSIE using the Xenroll control.

 Leif
 



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Jeroen C. van Gelderen

Kris Kennaway wrote:
 
 On Mon, 17 Jul 2000, Mark Murray wrote:
 
   On the other hand, doing a dd if=/dev/random of=/dev/null gives me
   infinite "randomness" at 10MB/sec - have the semantics of /dev/random
   changed?
 
  Yes; remember that what we have here is Yarrow algorithm; which is an
  algorithm for cryptographically secure PRNG - one whose internal state
  is unguessable, or if compromised folr some reason is self-recovering.
 
  "Infinite" randomness is possible with this algorithm.
 
 On the other hand, didn't you say that at system boot the RNG is
 essentially unseeded, so this is actually a liability because processes
 cannot be sure they're getting real randomness.

/dev/random should block until it has seeded. If it does not
it's a bug. /dev/random should *never* spit out non-random
bytes.

Cheers,
Jeroen
-- 
Jeroen C. van Gelderen  o  _ _ _
[EMAIL PROTECTED]  _o /\_   _ \\o  (_)\__/o  (_)
  _ \_   _(_) (_)/_\_| \   _|/' \/
 (_)(_) (_)(_)   (_)(_)'  _\o_


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Jeroen C. van Gelderen

Poul-Henning Kamp wrote:
 
 In message [EMAIL PROTECTED], "Louis A. Mamakos" writ
 es:
 
 In fact, it would be rather interesting to have a configuration flag which
 always forces something like an fsck on a file system in order to provide
 some entropy to the random device.  Or some other user-exposed way of
 providing entropy.  I might have some data on disk, or some network
 operations which can be performed to help seed the entropy pool.
 
 What we really need is this:
 
 fetch -o http://entropy.freebsd.org/  /dev/random
 
 with a bunch of volounteers providing random bits to people in need.
 
 I have thought about adding a entropy server to my array of weird
 servers in my lab.  Something like a Geiger counter and a smokedetector
 could do wonders.

Right, and an attacker laughingly sniffing those bits.
I think you forgot a ';-p'

Cheers,
Jeroen
-- 
Jeroen C. van Gelderen  o  _ _ _
[EMAIL PROTECTED]  _o /\_   _ \\o  (_)\__/o  (_)
  _ \_   _(_) (_)/_\_| \   _|/' \/
 (_)(_) (_)(_)   (_)(_)'  _\o_


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Jeroen C. van Gelderen

Poul-Henning Kamp wrote:
 
 In message [EMAIL PROTECTED], Alexander Langer writ
 es:
 Thus spake Poul-Henning Kamp ([EMAIL PROTECTED]):
 
  I have thought about adding a entropy server to my array of weird
  servers in my lab.  Something like a Geiger counter and a smokedetector
  could do wonders.
 
 HA! Cool!
 
 Do that please!
 
 I mean, seriously.
 And an option to sysinstall, where you can enable this as you can with
 ntpdate :)
 
 DuH!
 
 NTP is the perfect way to gather entropy at bootup!
 
 Predicting the clock's offset from reality and the two way path to
 the server of choice is impossible, plus if people enable authentication
 later on the packets will be choke full of high-quality entropy.

Please quantify 'impossible'.

 We need an enterprising soul to add an option (default on) to
 ntpdate to write the received packets in toto to /dev/random
 if it exists.

I think we first need to figure out the security implications.

Cheers,
Jeroen
-- 
Jeroen C. van Gelderen  o  _ _ _
[EMAIL PROTECTED]  _o /\_   _ \\o  (_)\__/o  (_)
  _ \_   _(_) (_)/_\_| \   _|/' \/
 (_)(_) (_)(_)   (_)(_)'  _\o_


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Louis A. Mamakos

 In message [EMAIL PROTECTED], Alexander Langer writ
 es:
 Thus spake Poul-Henning Kamp ([EMAIL PROTECTED]):
 
  I have thought about adding a entropy server to my array of weird
  servers in my lab.  Something like a Geiger counter and a smokedetector
  could do wonders.
 
 HA! Cool!
 
 Do that please!
 
 I mean, seriously.
 And an option to sysinstall, where you can enable this as you can with
 ntpdate :)
 
 DuH!
 
 NTP is the perfect way to gather entropy at bootup!
 
 Predicting the clock's offset from reality and the two way path to
 the server of choice is impossible, plus if people enable authentication
 later on the packets will be choke full of high-quality entropy.
 
 We need an enterprising soul to add an option (default on) to
 ntpdate to write the received packets in toto to /dev/random
 if it exists.
 
 If somebody does this, I will spear-head the effort of getting it
 into the ntpv4 sources (Hmm, don't  I have a commit bit there
 already ?  Can't remember...)

Actually, you could really use this in ntpd(8), rather than just ntpdate.
You could crank in the offset and delay samples for each packet
received from an NTP peer; this will have the effect of adding into
the entropy pool the "noise" in the latency of the path between you
and each of your NTP peers.  This varies over time with each sample,
and in fact, NTP goes to considerable effort in it's sample filtering
to exclude the noisy samples.  We need to get that date before it's
discarded and contribute it to the entropy cause.

louie




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



cer/b7b/pfc - pem

2000-07-17 Thread Garrett Wollman

On Tue, 18 Jul 2000 02:14:23 +0200, "Leif Neland" [EMAIL PROTECTED] said:

 I can export the key as a .cer, .p7b or .pfx, but openssl seems to want it
 in .pem format.

Of course, you haven't really told us what the format of these things
is, so it's difficult to say.

The ``standard'' export format is something called PKCS#12.  You can
use `openssl pkcs12' with various options to extract the key and
certificate from this sort of format.  It will prompt you for the
password you specified when exporting.

If you export in any other format, it is highly unlikely to contain
your private key, which is required to make use of the certificate.
Those other formats are normally used when you want to distribute your
public key to someone or as a part of something other than a mail
message.

-GAWollman

--
Garrett A. Wollman   | O Siem / We are all family / O Siem / We're all the same
[EMAIL PROTECTED]  | O Siem / The fires of freedom 
Opinions not those of| Dance in the burning flame
MIT, LCS, CRS, or NSA| - Susan Aglukark and Chad Irschick


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Recent -CURRENT locks up keyboard

2000-07-17 Thread Greg Lehey

I've just built a new world on one of my test boxes.  The good news is
that the Macronix Ethernet card that I have in it works fine (this is
the one with the MX98715AEC-C chip with the small hash table).  The
bad news is that the keyboard is non-functional.  This is a GENERIC
kernel with nothing changed.

Greg
--
Finger [EMAIL PROTECTED] for PGP public key
See complete headers for address and phone numbers


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



RE: randomdev entropy gathering is really weak

2000-07-17 Thread David Schwartz


  Predicting the clock's offset from reality and the two way path to
  the server of choice is impossible, plus if people enable authentication
  later on the packets will be choke full of high-quality entropy.

 Please quantify 'impossible'.

Impossible as in cannot be done. The offset between, for example, the
processor clock and the NIC clock is unpredictable.

DS



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Jeroen C. van Gelderen

David Schwartz wrote:
 
   Predicting the clock's offset from reality and the two way path to
   the server of choice is impossible, plus if people enable authentication
   later on the packets will be choke full of high-quality entropy.
 
  Please quantify 'impossible'.
 
 Impossible as in cannot be done. The offset between, for example, the
 processor clock and the NIC clock is unpredictable.

The EXACT offset is unpredictable. Unfortunately that's not 
what matters because an attacker can still guess.

What does matter is the set of likely/possible offsets. That 
set may be small or may be large or may be biased. Can you 
tell me how large it *typically* is on your computer? 

My clock usually is within a few seconds from my NTP server. 
I guess -assuming microsecond resolution- that allows for a 
couple of million possibilities but no more. I can definately
extract one or two bits of entropy from this, but can I do
ten, twenty or even 30? [1]

Can you generate a 1024-bit RSA key after processing 10 NTP
packets? I don't think so. How many *do* you need?

You need to quantify all this to make a good entropy estimate.
Just implementing this functionality because 'predicting the
clock's offset [...] is impossible' is pretty pointless.

Cheers,
Jeroen

[1] And then, what's the effect of an attacker sniffing your
LAN? What information would he have to make his guess more
accurate?
-- 
Jeroen C. van Gelderen  o  _ _ _
[EMAIL PROTECTED]  _o /\_   _ \\o  (_)\__/o  (_)
  _ \_   _(_) (_)/_\_| \   _|/' \/
 (_)(_) (_)(_)   (_)(_)'  _\o_


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: fetch(1) bug?

2000-07-17 Thread Akinori -Aki- MUSHA

At 17 Jul 2000 23:38:23 +0200,
DES wrote:
 I've spent most of the night fixing this and am about to commit the
 last changes, so you should be able to cvsup and build working
 libfetch and fetch in an hour or two.

Thanks!  I could confirm that your changes fixed the problem, and am
happy to see them MFC'd before 4.1-RELEASE. :)

-- 
   /
  /__  __   
 / )  )  ) )  /
Akinori -Aki- MUSHA aka / (_ /  ( (__(  @ idaemons.org / FreeBSD.org

"We're only at home when we're on the run, on the wing, on the fly"


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: HEADS UP, mtree defaults returns back to original

2000-07-17 Thread Warner Losh

In message [EMAIL PROTECTED] "Andrey A. Chernov" writes:
: 2716:
:   mtree now NOT follows symlinks by default, old behaviour restored to be 
:   compatible with rest of *BSD camp. New -L option added to follow 
:   symlinks. This require manual mtree rebuilding before 'make world'

Is this still needed?

Warner


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: randomdev entropy gathering is really weak

2000-07-17 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], "Jeroen C. van Gelderen" writes
:

 Predicting the clock's offset from reality and the two way path to
 the server of choice is impossible, plus if people enable authentication
 later on the packets will be choke full of high-quality entropy.

Please quantify 'impossible'.

People have tried for 30+ years to predict what a quartz xtal
will do next.  Nobody expects any chance of success.  Add to this
the need to predict the difference between one or more NTP servers
and your local qartz xtal and I think we can safely say "impossible".

I think we first need to figure out the security implications.

I think the security implications of having no entropy are much
worse than having entropy which a truly superhuman *maybe* could
guess *some* of the bits in, are far worse.

--
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message