Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Indeed. When I first saw it, I thought someone was coming out of the closet! t On Aug 19, 2012, at 4:40 AM, Robert Kim App and Facebook Marketing wrote: > > DakaRand seems to work inside of VM's too > > Dan, if you get any new revelations on it, please do make sure you post using > a different subject line. This one's getting really congested. > > Thanks! > > -- > Robert Q Kim, > Trade Show Marketing Strategies VP > Sparkah Destination Event Management > http://www.youtube.com/watch?v=RrXcLCVkFds > 2611 S Coast Highway > San Diego, CA 92007 > 310 598 1606 > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
> DakaRand seems to work inside of VM's too Dan, if you get any new revelations on it, please do make sure you post using a different subject line. This one's getting really congested. Thanks! -- Robert Q Kim, Trade Show Marketing Strategies VP Sparkah Destination Event Management http://www.youtube.com/watch?v=RrXcLCVkFds 2611 S Coast Highway San Diego, CA 92007 310 598 1606 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Sat, Aug 18, 2012 at 04:00:20PM -0700, coderman wrote: > Dan just released "DakaRand" > http://dankaminsky.com/2012/08/15/dakarand/ > > src http://s3.amazonaws.com/dmk/dakarand-1.0.tgz > > while admitting that "Matt Blaze has essentially disowned this > approach, and seems to be honestly horrified that I’m revisiting it" > and "Let me be the first to say, I don’t know that this works." this > mode would greatly reduce, maybe eliminate the incidence of key > duplication in large sample sets (e.g. visibly poor entropy for key > generation) > > the weak keys[0] authors clearly posit that they have detected merely > the most obvious and readily accessible poor keys, and that further > attacks against generator state could yield even more vulnerable > pairs... you have been warned :P > > the solution is adding hw entropy[1][2] to the mix. anything less is > doing it wrong! > > if you don't have hw entropy, adding dakarand is better than not. Lots of people are using "haveged" already, it operates on a similar principle. http://www.issihosts.com/haveged/ Ciao, Marcus ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Yeah, turns out RNG's *aren't* on most motherboards. Thus, DakaRand. The biggest surprise of this entire adventure is that DakaRand seems to work inside of VM's too. Didn't expect that at all. But then, I think it's going to take some time to analyze what's going on here. On Sat, Aug 18, 2012 at 4:00 PM, coderman wrote: > Dan just released "DakaRand" > http://dankaminsky.com/2012/08/15/dakarand/ > > src http://s3.amazonaws.com/dmk/dakarand-1.0.tgz > > while admitting that "Matt Blaze has essentially disowned this > approach, and seems to be honestly horrified that I’m revisiting it" > and "Let me be the first to say, I don’t know that this works." this > mode would greatly reduce, maybe eliminate the incidence of key > duplication in large sample sets (e.g. visibly poor entropy for key > generation) > > the weak keys[0] authors clearly posit that they have detected merely > the most obvious and readily accessible poor keys, and that further > attacks against generator state could yield even more vulnerable > pairs... you have been warned :P > > the solution is adding hw entropy[1][2] to the mix. anything less is > doing it wrong! > > if you don't have hw entropy, adding dakarand is better than not. > > 0. "Mining Your Ps and Qs: Detection of Widespread Weak Keys in > Network Devices - Extended" > https://factorable.net/weakkeys12.extended.pdf > > 1. "Intel RNG" > http://lists.randombit.net/pipermail/cryptography/2012-June/002995.html > see also by thread: > > http://lists.randombit.net/pipermail/cryptography/2012-June/thread.html#2995 > > 2. xstore > > http://www.via.com.tw/en/downloads/whitepapers/initiatives/padlock/rng_prog_guide.pdf > > X. LD 50 radiation exposure of the common pigeon. entropy via carrier > pigeon (DRAFT) > ;P > > P.P.S: if you're not passing valid hw entropy into VM guests, you're > also doing it wrong. even enough passed at boot is sufficient, > provided key generation is secure. always a million caveats... and > adding dakarand to guests is better than not. > > > On Wed, Jul 18, 2012 at 12:35 PM, coderman wrote: > > On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky wrote: > >> ... > >> Don't we have hardware RNG in most motherboard chipsets nowadays? > > > > clearly not enough of them! > > > > 'Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network > Devices' > > https://factorable.net/weakkeys12.extended.pdf > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Dan just released "DakaRand" http://dankaminsky.com/2012/08/15/dakarand/ src http://s3.amazonaws.com/dmk/dakarand-1.0.tgz while admitting that "Matt Blaze has essentially disowned this approach, and seems to be honestly horrified that I’m revisiting it" and "Let me be the first to say, I don’t know that this works." this mode would greatly reduce, maybe eliminate the incidence of key duplication in large sample sets (e.g. visibly poor entropy for key generation) the weak keys[0] authors clearly posit that they have detected merely the most obvious and readily accessible poor keys, and that further attacks against generator state could yield even more vulnerable pairs... you have been warned :P the solution is adding hw entropy[1][2] to the mix. anything less is doing it wrong! if you don't have hw entropy, adding dakarand is better than not. 0. "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices - Extended" https://factorable.net/weakkeys12.extended.pdf 1. "Intel RNG" http://lists.randombit.net/pipermail/cryptography/2012-June/002995.html see also by thread: http://lists.randombit.net/pipermail/cryptography/2012-June/thread.html#2995 2. xstore http://www.via.com.tw/en/downloads/whitepapers/initiatives/padlock/rng_prog_guide.pdf X. LD 50 radiation exposure of the common pigeon. entropy via carrier pigeon (DRAFT) ;P P.P.S: if you're not passing valid hw entropy into VM guests, you're also doing it wrong. even enough passed at boot is sufficient, provided key generation is secure. always a million caveats... and adding dakarand to guests is better than not. On Wed, Jul 18, 2012 at 12:35 PM, coderman wrote: > On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky wrote: >> ... >> Don't we have hardware RNG in most motherboard chipsets nowadays? > > clearly not enough of them! > > 'Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices' > https://factorable.net/weakkeys12.extended.pdf ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky wrote: > ... > Don't we have hardware RNG in most motherboard chipsets nowadays? clearly not enough of them! 'Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices' https://factorable.net/weakkeys12.extended.pdf """ RSA and DSA can fail catastrophically when used with malfunctioning random number generators, but the extent to which these problems arise in practice has never been comprehensively studied at Internet scale. We perform the largest ever network survey of TLS and SSH servers and present evidence that vulnerable keys are surprisingly widespread. We find that 0.75% of TLS certificates share keys due to insufficient entropy during key generation, and we suspect that another 1.70% come from the same faulty implementations and may be susceptible to compromise. Even more alarmingly, we are able to obtain RSA private keys for 0.50% of TLS hosts and 0.03% of SSH hosts, because their public keys shared nontrivial common factors due to entropy problems, and DSA private keys for 1.03% of SSH hosts, because of insufficient signature randomness. We cluster and investigate the vulnerable hosts, finding that the vast majority appear to be headless or embedded devices. """ infosec comedy gold :P ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On 12/25/2010 08:10 AM, BMF wrote: > On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky wrote: >> Don't we have hardware RNG in most motherboard chipsets nowadays? > Do we? By what mechanism do they operate? There are several external (USB/PCI) devices which operate either on analogous effects (using for example a PLL) or even digital effects such as circuit jitter. I've implemented this on an FPGA before using repeated open/close of a short circuit that contains several inverters. The result is based on the underlying logic blocks which contain jitter due to the production process. There are several papers available on that topic (search for "true hardware RNG FPGA" for example). As for internal (on-board) RNGs, there is for example the TPM. If you have a TPM on your mainboard, then you can use it as an RNG. The TPM specification recommends using clock jitter and thermal noise in the chip to seed a state machine that will perform the actual random number generation through hashing/mixing (so it's not a direct source of hardware randomness but rather a seeded PRNG). To find out about the quality of such an RNG, one can collect a sufficiently large sample and then run RNG tests on it, such as NIST's tests (http://csrc.nist.gov/groups/ST/toolkit/rng/index.html) or external tools like "dieharder" (http://www.phy.duke.edu/~rgb/General/dieharder.php). Best, Chris ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On 12/25/2010 04:47 PM, coderman wrote: > > a torrent of raw output is preferable to a smaller stream of whitened, > "more random" bits. there are a million kitschy ways to collect > entropy like lava lamp cams and Bernoulli effects across your spinning > disks. Yes, and this is why professional cryptographers always leave the room as soon as the topic of entropy collection comes up: it inevitably ends up with a lot of amateurs arguing about the relative merits of diode junctions vs hamster cams. (oh yeah, I went there) http://www.youtube.com/watch?v=a1Y73sPHKxw There have been some high-profile breaks because of insufficient entropy, for example Netscape Navigator (Wagner 1996) and Debian OpenSSL (CVE-2008-0166). But those were total boneheaded screwups, I'm not aware of any cases where the implementers did halfway competent job of estimating entropy input, seeding with at least 128 bits of it before key generation, and the resulting system was broken. Somebody come up with some examples. So I'm not convinced that "entropy collection is hard". I think it's probably more accurate to say: * Accurate estimation of collected entropy is hard * Gathering entropy quickly after power-on in WRT-54G hardware is hard * Communicating the assumptions of sufficient entropy made by other parts of the system is hard. This is important to get right because when people hear "entropy collection is hard" they become willing to throw common sense to the wind and adopt cures which are worse than the disease. E.g. OpenBSD substituting RC4 keyed by 64Kbit LFSRs for an established design. - Marsh ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Sat, Dec 25, 2010 at 2:43 PM, Dan Kaminsky wrote: > ... > Making noisy diodes isn't all that hard, AFAIK. You eliminate bias by only > returning difference bits -- 01 is a 0, 10 is a 0. Whether the underlying > silicon is in fact doing that...well, that's a question for the chip > reversers. noisy diodes, free spinning oscillators, ring oscillators, sub samplings of above in complex structures, lots of options without lava lamp or spinning platter craziness. [0] as for eliminating bias, the von Neumann whitener as you describe works well, but has unpredictable throughput. (that is, one word/buffer may take longer to fill than the next depending on generated bits, and at best you've got a significant reduction in throughput.) this is one reason it is preferable to read raw biased entropy at maximum rate from the hardware source into an entropy daemon which then validates hardware output before whitening, compressing, and/or digesting read bits. best regards, happy holidays, done beating this dead horse for now... ;) 0. there's a nice survey/list in chapter 4 of Cryptographic Engineering. http://books.google.com/books?isbn=0387718168 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
i should have just linked to dieharder: http://www.phy.duke.edu/~rgb/General/dieharder.php On Sat, Dec 25, 2010 at 2:47 PM, coderman wrote: > > 0. Sanity checks on hw sources to include > ... > - anything else useful? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Sent from my iPhone On Dec 25, 2010, at 2:38 PM, BMF wrote: > On Sat, Dec 25, 2010 at 2:12 PM, wrote: >> Check out Markus Jacobsson et al, "A Practical Secure Physical Random >> Bit Generator", 1998, using the turbulence of airflow inside the drive >> as the source of randomness. Can't do much better than that. > > I read that when it came out. I am quite familiar with turbulent > boundary layers. Nobody sells hardware (hard drives, in this case) > which actually implements the technique. All of my original queries > still stand. Making noisy diodes isn't all that hard, AFAIK. You eliminate bias by only returning difference bits -- 01 is a 0, 10 is a 0. Whether the underlying silicon is in fact doing that...well, that's a question for the chip reversers. > > BMF > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Sat, Dec 25, 2010 at 2:12 PM, wrote: > ... > Check out Markus Jacobsson et al, "A Practical Secure Physical Random > Bit Generator", 1998, using the turbulence of airflow inside the drive > as the source of randomness. Can't do much better than that. how much turbulence does my SLC FDE make? the reason i prefer on die is that pre-boot operations and/or host init can make use of these sources via built-in facilities without need for additional drivers to external devices that may in turn require bus initialization and interrupt allocation, and so on, etc. likewise, if bootstrapping a secure network requires strong random numbers a network based entropy distribution setup to hosts without their own physical sources is not so useful for that task. there are many other considerations weighting toward on-die implementations, like clock and sample rates, but proper hardware entropy engineering is a verbose tangent way too long for this already meandering discussion... [0] :) 0. if you're really curious, check out Cryptographic Hardware and Embedded Systems proceedings, any hw design texts by authors of these proceedings, and then you'll know what your known unknowns are and can brazenly blaze forward into the esoteric or halt early satisfyingly convincing yourself that you could give two shits about what it takes to build proper kit. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
> On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky wrote: >> Don't we have hardware RNG in most motherboard chipsets nowadays? On Fri, Dec 24, 2010 at 11:10 PM, BMF wrote: > Do we? By what mechanism do they operate? Thermal noise seems the > easiest way to go a plethora of options abound. a torrent of raw output is preferable to a smaller stream of whitened, "more random" bits. there are a million kitschy ways to collect entropy like lava lamp cams and Bernoulli effects across your spinning disks. the key idea being that an entropy daemon (reduced priv. in userspace) will validate the incoming raw stream to satisfaction, guarding against physical errors (hw producing stream of 0 bits) or degredation (abrupt / unacceptable level of bias sanity checks failing raw stream - see FIPS long runs, monobit, other basic "it's not clearly broken" checks. [0] incidentally marsh ray, this is why no hw to kernel random feed is a feature, not a bug, regarding your earlier post. as long as an entropy daemon has a mechanism to feed into the kernel pool you are golden - this is the proper way to incorporate a hw source into overall host / application entropy needs. (can be as easy as writing to /dev/random and handling writable state events on fd to replenish kernel pool for all uses.) and as always, you can never prove something is random or guarantee an entropy density. at best you're making an educated guess and weeding out what is clearly not random. (this fact makes for fun complications) > ... although I have always preferred the idea of > sampling random radioactive decay simply for the purity of the > immediate result. so elegant. just harder to get on die *grin* > What is the quality of the entropy of the devices > you speak of? How fast do they generate entropy? my favorite is the XSTORE instruction in padlock engine. it is good quality with published design and independently validated implementation capable of 120Mbps+ on newer processors - more than you'll ever need. n2rng on SPARC T2 also great. there are many decent hw sources in various platforms from AMD, Intel, SPARC, and hardware security modules / crypto accelerators from numerous others. all depends on your application and kit... also many that suck. do your homework :) > How could I tell if my machine had hw rng built in? cat /proc/cpuinfo for flags, lspci | lsusb for accelerator / bus devices, and/or start host entropy service (rngd, mtrngd, cryptoki, etc.) sadly, these physical sources are not nearly as plentiful as they should be, and even if present rarely does the host operating system and applications make use of it. > ... I have heard of > people pointing webcams at lava lamps and such to get random numbers. there should be an award for creative entropy; this is one of the saner sources people have built ;) 0. Sanity checks on hw sources to include, but not limited to: - volume of at least 80 megabits under consideration and 1500 Byte to 4kB validation before mixing with host pool. - FIPS 140-1 suite - run length variance - column, overall, block means - random walk test - spectral analysis w/ high, med, low, smoothing and correlation adjustment - 8,16 bit Maurer tests - 4,8,16 bit monkey tests - Komologorov-Smirnov trend test - anything else useful? this still leaves the difficult task of determining the acceptable limits and tunable parameters for your specific hardware sources, entropy daemon settings, and profile of entropy consumption in applications, network stacks, and kernel. did i mention good entropy is hard? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Sat, Dec 25, 2010 at 2:12 PM, wrote: > Check out Markus Jacobsson et al, "A Practical Secure Physical Random > Bit Generator", 1998, using the turbulence of airflow inside the drive > as the source of randomness. Can't do much better than that. I read that when it came out. I am quite familiar with turbulent boundary layers. Nobody sells hardware (hard drives, in this case) which actually implements the technique. All of my original queries still stand. BMF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
BMF wrote: > Dan Kaminsky wrote: > > Don't we have hardware RNG in most motherboard chipsets nowadays? > > Do we? By what mechanism do they operate? Thermal noise seems the > easiest way to go although I have always preferred the idea of > sampling random radioactive decay simply for the purity of the > immediate result. What is the quality of the entropy of the devices > you speak of? How fast do they generate entropy? I have heard nothing > about this. How could I tell if my machine had hw rng built in? > > Some i810 series chipsets have hw rng. There is also the Intel 80802 > Firmware Hub chip that nobody seems to use anymore. I have heard of > people pointing webcams at lava lamps and such to get random numbers. Check out Markus Jacobsson et al, "A Practical Secure Physical Random Bit Generator", 1998, using the turbulence of airflow inside the drive as the source of randomness. Can't do much better than that. -- Charles Polisher ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky wrote: > Don't we have hardware RNG in most motherboard chipsets nowadays? Do we? By what mechanism do they operate? Thermal noise seems the easiest way to go although I have always preferred the idea of sampling random radioactive decay simply for the purity of the immediate result. What is the quality of the entropy of the devices you speak of? How fast do they generate entropy? I have heard nothing about this. How could I tell if my machine had hw rng built in? Some i810 series chipsets have hw rng. There is also the Intel 80802 Firmware Hub chip that nobody seems to use anymore. I have heard of people pointing webcams at lava lamps and such to get random numbers. BMF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Such a gay thread subject, ain't it? On Fri, Dec 24, 2010 at 11:24 PM, Marsh Ray wrote: > On 12/24/2010 07:08 PM, Dan Kaminsky wrote: >> >> Don't we have hardware RNG in most motherboard chipsets nowadays? >> >> (Not that you should exclusively trust it, but the nature of RNG's is >> that it's easy to mix in sources.) > > Haha, you're going to love this: > >> http://code.bsd64.org/cvsweb/openbsd/src/sys/dev/rnd.c?rev=1.106;content-type=text%2Fplain >> >> switch(minor(dev)) { >> case RND_RND: >> ret = EIO; /* no chip -- error */ >> break; >> case RND_SRND: >> case RND_URND: >> case RND_ARND_OLD: >> case RND_ARND: >> arc4random_buf(buf, n); >> break; >> default: >> ret = ENXIO; >> } > > - Marsh > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > Marcio Barbado, Jr. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On 12/24/2010 07:08 PM, Dan Kaminsky wrote: > > Don't we have hardware RNG in most motherboard chipsets nowadays? > > (Not that you should exclusively trust it, but the nature of RNG's is > that it's easy to mix in sources.) Haha, you're going to love this: > http://code.bsd64.org/cvsweb/openbsd/src/sys/dev/rnd.c?rev=1.106;content-type=text%2Fplain > > switch(minor(dev)) { > case RND_RND: > ret = EIO; /* no chip -- error */ > break; > case RND_SRND: > case RND_URND: > case RND_ARND_OLD: > case RND_ARND: > arc4random_buf(buf, n); > break; > default: > ret = ENXIO; > } - Marsh ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Fri, Dec 24, 2010 at 4:37 PM, BMF wrote: > On Fri, Dec 24, 2010 at 4:27 PM, coderman wrote: > > how many of you have a competent userspace entropy > > daemon funneling hardware sources into host pool? > > It would be nice if there were inexpensive hardware sources available > and a means to distribute the entropy among hosts in one's own trusted > infrastructure. I have a mail server, a name server, an ntp server > (usually several), among various other sorts of pieces of > infrastructure which serve hundreds or even thousands of servers. Why > not an entropy server? It would be nice if I could setup an entropy > generating black box somewhere and attach it via USB to my entropy > server host then install a package with a config file on all of my > machines pointing to the entropy host. But so far I know of no such > thing. Do you? > > Don't we have hardware RNG in most motherboard chipsets nowadays? (Not that you should exclusively trust it, but the nature of RNG's is that it's easy to mix in sources.) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Fri, Dec 24, 2010 at 4:27 PM, coderman wrote: > how many of you have a competent userspace entropy > daemon funneling hardware sources into host pool? It would be nice if there were inexpensive hardware sources available and a means to distribute the entropy among hosts in one's own trusted infrastructure. I have a mail server, a name server, an ntp server (usually several), among various other sorts of pieces of infrastructure which serve hundreds or even thousands of servers. Why not an entropy server? It would be nice if I could setup an entropy generating black box somewhere and attach it via USB to my entropy server host then install a package with a config file on all of my machines pointing to the entropy host. But so far I know of no such thing. Do you? BMF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Fri, Dec 24, 2010 at 1:53 AM, Marsh Ray wrote: > ... > So there are these many hundreds of lines of entropy management code in > OpenBSD implementing what is claimed to be a novel architecture for random > number generation and yet this guy, who is going around giving talks on it, > is expecting someone else to quantify it and "come forward with a paper"? given the OpenBSD architecture and entropy consumption the performance and characteristics of random number generation and use is very context and architecture specific. while i agree this guy should have access to either his own or remotely accessible compatibility test cluster, he clearly is lacking applied test and measurement with sufficient detail "for a paper". in any case, did i mention good entropy is hard? :) > The burden of proof lies with the "amateur cryptographers" making the > security claims about it, not those questioning them. sure. perhaps the most frequent misconception is the model around entropy consumption in OpenBSD vs. most other unix and windows variants. OpenBSD in particular assumes significant and sustained use of random numbers in across kernel and userspace domains. this is a distinction conveniently negligible if you've got fast true random hardware entropy sources available. speaking of Cassandra complex, coming up on a decade of hw entropy advocacy [0] and still about the same level of progress as IPv6 core deployment... how many of you have a competent userspace entropy daemon funneling hardware sources into host pool? *grin* 0. VIA Padlock C5XL, C5P XSTORE http://www.mail-archive.com/openssl-dev@openssl.org/msg18264.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Well that makes one of you!!! ;-) Gary B On 12/24/2010 09:18 AM, McGhee, Eddie wrote: > I is Love musntlive. > > -Original Message- > From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of ?? > Sent: 24 December 2010 13:05 > To: coderman > Cc: full-disclosure@lists.grok.org.uk; mic...@lucifer.net > Subject: Re: [Full-disclosure] how i stopped worrying and loved the backdoor > > Hello full disclosure!!! > > I'd like to warn you about many things but not bucketing. However is you must read and not be troll for you is to understand this for your own. musntlive cannot be all everyone's guide to common sense. > > "A Provably Secure And Efficient Countermeasure Against Timing Attacks" > http://eprint.iacr.org/2009/089.pdf > > "Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks" > http://users.cis.fiu.edu/~smithg/papers/csf10.pdf > > In is musntlive's interpretation is everyone miss OpenBSD big picturuski: > > a1) Hiding in plain sight > a2) Developer Deception > > Is musntlive establish (proven: this is not theory) that developers lied all along. So while is many cry troll, musntlive laugh and think of Cassandra. > > b1) Is OpenBSD not audit anything otherwise this not happen > b2) For those trolls (Schmehl) who state: `Someone would have caught it` - they is forget that crypto is highly specialized and is all a part of the corruption machine, there is none to catch [is see Juvenal quote who watching watchers] > b3) We is now privy to see how Theo via foreign financial accounts is tied into this - he can disprove this is he like but he is likely stay shut > b4) Theo is come clean not to show public `I come clean I not know` but more is to say `is I come clean before is beans spilled, everyone is believe me` > > [Response a1] Is because crypto implementation very hard is difficult for to someone to audit is code. In normal programming a simple operator can is change the entire game. Is difference between < and is say > is all one need. For this we is now take into account 'salami attacks' (do not is say musntlive not warn you) > > [Response a2] Is everyone forget KGII (key goal is indicators) of everything. Money is talk (see b3) and when is everyone is on the same ledger[payroll] and is give geek dream job of one being superspyman, egos run stupid. Geeks is like Jason is stupid for to government say: > "Give is stupid nerd some Mountain Dew, mousepad, new laptop, he ours!" versus old school "he is wants Ferrari, cash and ladies" (see Mafiosi requirements for cash). > > When money is motivator is one be surprised at what someone is capable of is... is. Is everyone too stupid to remember this or do everyone is believe no one is above corruption particularisly "FOSS" developers. > (I is pity you is you think this) > > [Response b1] Is who will come clean when all is dirty on the developer team. 3 people on code all on the same covert team and is one head honchoruski (Theo see b3) is getting kickbacks in covert accounts > > [Response b2] For Paul Schmehl and other trolls I is like to introduce you to is Cassandra Complex > http://en.wikipedia.org/wiki/Cassandra_(metaphor) > > [Response b3] http://www.youtube.com/watch?v=bjZRAvsZf1g > > [Response b4] Theo is not to be believed on this whole matter see Cassandra Complex > > > Happy Merry Jolly and is Merry Happy New Year. > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
I is Love musntlive. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of ?? Sent: 24 December 2010 13:05 To: coderman Cc: full-disclosure@lists.grok.org.uk; mic...@lucifer.net Subject: Re: [Full-disclosure] how i stopped worrying and loved the backdoor Hello full disclosure!!! I'd like to warn you about many things but not bucketing. However is you must read and not be troll for you is to understand this for your own. musntlive cannot be all everyone's guide to common sense. "A Provably Secure And Efficient Countermeasure Against Timing Attacks" http://eprint.iacr.org/2009/089.pdf "Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks" http://users.cis.fiu.edu/~smithg/papers/csf10.pdf In is musntlive's interpretation is everyone miss OpenBSD big picturuski: a1) Hiding in plain sight a2) Developer Deception Is musntlive establish (proven: this is not theory) that developers lied all along. So while is many cry troll, musntlive laugh and think of Cassandra. b1) Is OpenBSD not audit anything otherwise this not happen b2) For those trolls (Schmehl) who state: `Someone would have caught it` - they is forget that crypto is highly specialized and is all a part of the corruption machine, there is none to catch [is see Juvenal quote who watching watchers] b3) We is now privy to see how Theo via foreign financial accounts is tied into this - he can disprove this is he like but he is likely stay shut b4) Theo is come clean not to show public `I come clean I not know` but more is to say `is I come clean before is beans spilled, everyone is believe me` [Response a1] Is because crypto implementation very hard is difficult for to someone to audit is code. In normal programming a simple operator can is change the entire game. Is difference between < and is say > is all one need. For this we is now take into account 'salami attacks' (do not is say musntlive not warn you) [Response a2] Is everyone forget KGII (key goal is indicators) of everything. Money is talk (see b3) and when is everyone is on the same ledger[payroll] and is give geek dream job of one being superspyman, egos run stupid. Geeks is like Jason is stupid for to government say: "Give is stupid nerd some Mountain Dew, mousepad, new laptop, he ours!" versus old school "he is wants Ferrari, cash and ladies" (see Mafiosi requirements for cash). When money is motivator is one be surprised at what someone is capable of is... is. Is everyone too stupid to remember this or do everyone is believe no one is above corruption particularisly "FOSS" developers. (I is pity you is you think this) [Response b1] Is who will come clean when all is dirty on the developer team. 3 people on code all on the same covert team and is one head honchoruski (Theo see b3) is getting kickbacks in covert accounts [Response b2] For Paul Schmehl and other trolls I is like to introduce you to is Cassandra Complex http://en.wikipedia.org/wiki/Cassandra_(metaphor) [Response b3] http://www.youtube.com/watch?v=bjZRAvsZf1g [Response b4] Theo is not to be believed on this whole matter see Cassandra Complex Happy Merry Jolly and is Merry Happy New Year. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
Hello full disclosure!!! I'd like to warn you about many things but not bucketing. However is you must read and not be troll for you is to understand this for your own. musntlive cannot be all everyone's guide to common sense. "A Provably Secure And Efficient Countermeasure Against Timing Attacks" http://eprint.iacr.org/2009/089.pdf "Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks" http://users.cis.fiu.edu/~smithg/papers/csf10.pdf In is musntlive's interpretation is everyone miss OpenBSD big picturuski: a1) Hiding in plain sight a2) Developer Deception Is musntlive establish (proven: this is not theory) that developers lied all along. So while is many cry troll, musntlive laugh and think of Cassandra. b1) Is OpenBSD not audit anything otherwise this not happen b2) For those trolls (Schmehl) who state: `Someone would have caught it` - they is forget that crypto is highly specialized and is all a part of the corruption machine, there is none to catch [is see Juvenal quote who watching watchers] b3) We is now privy to see how Theo via foreign financial accounts is tied into this - he can disprove this is he like but he is likely stay shut b4) Theo is come clean not to show public `I come clean I not know` but more is to say `is I come clean before is beans spilled, everyone is believe me` [Response a1] Is because crypto implementation very hard is difficult for to someone to audit is code. In normal programming a simple operator can is change the entire game. Is difference between < and is say > is all one need. For this we is now take into account 'salami attacks' (do not is say musntlive not warn you) [Response a2] Is everyone forget KGII (key goal is indicators) of everything. Money is talk (see b3) and when is everyone is on the same ledger[payroll] and is give geek dream job of one being superspyman, egos run stupid. Geeks is like Jason is stupid for to government say: "Give is stupid nerd some Mountain Dew, mousepad, new laptop, he ours!" versus old school "he is wants Ferrari, cash and ladies" (see Mafiosi requirements for cash). When money is motivator is one be surprised at what someone is capable of is... is. Is everyone too stupid to remember this or do everyone is believe no one is above corruption particularisly "FOSS" developers. (I is pity you is you think this) [Response b1] Is who will come clean when all is dirty on the developer team. 3 people on code all on the same covert team and is one head honchoruski (Theo see b3) is getting kickbacks in covert accounts [Response b2] For Paul Schmehl and other trolls I is like to introduce you to is Cassandra Complex http://en.wikipedia.org/wiki/Cassandra_(metaphor) [Response b3] http://www.youtube.com/watch?v=bjZRAvsZf1g [Response b4] Theo is not to be believed on this whole matter see Cassandra Complex Happy Merry Jolly and is Merry Happy New Year. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
> "I agree that there's a good paper in this, I would love to see the > entropy added by the multi-consumer model quantified, or even an upper > bound placed on it. In the past when I've given my talk on randomness > in the OpenBSD network stack, I've discussed this and I always ask for > someone to come forward with such a paper. So there are these many hundreds of lines of entropy management code in OpenBSD implementing what is claimed to be a novel architecture for random number generation and yet this guy, who is going around giving talks on it, is expecting someone else to quantify it and "come forward with a paper"? This is the kind of stuff that just doesn't make a bit of sense. > Unfortunately I don't get the impression that the amateur cryptographers > questioning the OpenBSD PRNG are qualified to produce such a paper (if > they were, they wouldn't be mailing here, they'd be submitting it to > real cryptographers for peer review)" The burden of proof lies with the "amateur cryptographers" making the security claims about it, not those questioning them. - Marsh ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Thu, Dec 23, 2010 at 10:57 PM, coderman wrote: > ... > "good entropy is hard", is the theme of that thread. http://marc.info/?l=openbsd-tech&m=129304878126089&w=2 "I agree that there's a good paper in this, I would love to see the entropy added by the multi-consumer model quantified, or even an upper bound placed on it. In the past when I've given my talk on randomness in the OpenBSD network stack, I've discussed this and I always ask for someone to come forward with such a paper. Unfortunately I don't get the impression that the amateur cryptographers questioning the OpenBSD PRNG are qualified to produce such a paper (if they were, they wouldn't be mailing here, they'd be submitting it to real cryptographers for peer review)" perhaps musnt live will respond with a formal proof of entropy bound in obsd... ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On Thu, Dec 23, 2010 at 10:00 PM, Marsh Ray wrote: > ... >> how i stopped worrying and loved the backdoor > > Note that much of that is backed up by CVS history. > ... > For example, as he mentions in P2 the entropy pool extraction functions intelligently constraining key space and / or leaking key bits is the Right Way (tm) to do a backdoor. it requires knowledge of the particulars to execute and provides more robustness than a class break / full key leak. i hear they've got clusters of key crackers for searching reasonable spaces ;) also, this may not be limited to entropy pool. it would make much sense to combine elements of hardware accelerated crypto drivers with entropy reduction or key leakage to target specific installations or further obfuscate effects, as mentioned in the thread so linked. (and you could be pretty precise with such key space degradation, if desired!) > I even pointed some of this out the other day on this thread: > http://marc.info/?l=openbsd-tech&m=129298665720095&w=2 > Perhaps the reaction speaks louder than words. "good entropy is hard", is the theme of that thread. how do you measure entropy? a few bytes and i've turned terabytes of entropy into simple order. the debian openssl weak key debacle underscores just how difficult and obscure such technicalities are in the face of random human failures. a well funded adversary with specific targets and significant skill would enjoy plentiful opportunity and success. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] how i stopped worrying and loved the backdoor
On 12/23/2010 10:01 PM, Григорий Братислава wrote: > http://mickey.lucifier.net/b4ckd00r.html > > how i stopped worrying and loved the backdoor Note that much of that is backed up by CVS history. I'd seen some of those strange loops and bulk reformatting while reviewing the code commits last week. For example, as he mentions in P2 the entropy pool extraction functions are implemented in such a way as to require 156 times more invocations of the MD5 block compression function than are necessary. This remains in the code today. I even pointed some of this out the other day on this thread: http://marc.info/?l=openbsd-tech&m=129298665720095&w=2 Perhaps the reaction speaks louder than words. I'd had mickey's name on my short list -- and had written 'not netsec' beside it. :-) This is either something really interesting going on or the most spectacular trolling in net history. - Marsh ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/