Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-07 Thread Michal Zalewski
Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The script is run when the package installed, and anytime su executes the script. reseed(8) performs a unsecured HTTP request to random.org for its bits, despite random.org offering HTTPS services. This resulted in a couple of

Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-07 Thread Michal Zalewski
[ But for what it's worth, I am willing to bet that the script was added without analyzing these subtle considerations, and that makes it somewhat scary on its own accord. ] /mz

Ubuntu: reseed(8), random.org, and HTTP request

2011-07-06 Thread Jeffrey Walton
Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The script is run when the package installed, and anytime su executes the script. reseed(8) performs a unsecured HTTP request to random.org for its bits, despite random.org offering HTTPS services. The Ubuntu Security Team took no

Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-06 Thread coderman
On Tue, Jul 5, 2011 at 9:04 PM, Jeffrey Walton noloa...@gmail.com wrote: Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The script is run when the package installed, and anytime su executes the script. ... someone thought this was a good idea. [an entropy pool remotely

Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-06 Thread Jamie Strandboge
On Wed, 2011-07-06 at 00:04 -0400, Jeffrey Walton wrote: Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The script is run when the package installed, and anytime su executes the script. reseed(8) performs a unsecured HTTP request to random.org for its bits, despite