Re: Native JS Encryption

2011-03-21 Thread Shabsi Walfish
Just FYI, you are going to run into the problem of key portability. If the key is derived from a password, your encrypted copy of the user's data (which might be subject to subpoena?) could be easily cracked via offline dictionary attacks. I hope you at least plan to use a salt, many iterations of

Re: Native JS Encryption

2011-03-18 Thread Shabsi Walfish
On Fri, Mar 18, 2011 at 4:53 PM, Brendan Eich wrote: > On Mar 18, 2011, at 12:56 PM, Shabsi Walfish wrote: > > I'm not convinced that this use case, or any other use case I could think > of for the web (with the possible exception of DRM/encryption on streaming > media),

Re: Native JS Encryption

2011-03-18 Thread Shabsi Walfish
Hi Robert, I've put some thought into this topic, and I have a few comments for you (see below). On Fri, Mar 18, 2011 at 10:09 AM, Robert Accettura wrote: > I'll prefix this by saying I'm not entirely certain if this should be > ECMA vs. HTML5 or dual track similar to the "Cryptographically str

Re: [whatwg] Cryptographically strong random numbers

2011-02-16 Thread Shabsi Walfish
On Wed, Feb 16, 2011 at 11:05 AM, David Wagner wrote: > Shabsi Walfish writes: > > I think the question is whether or not this can be done in general > without > > blocking -- if you block, you can definitely get crypto-quality random > > numbers, but otherwise its no

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
On Mon, Feb 14, 2011 at 4:15 PM, Glenn Maynard wrote: > On Mon, Feb 14, 2011 at 6:43 PM, Shabsi Walfish wrote: > >> OpenSSL is not exactly a reliable source of cryptographic best practices. >> :) In any case, see here http://linux.die.net/man/4/urandom : > > >

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
On Mon, Feb 14, 2011 at 3:49 PM, Bill Frantz wrote: > On 2/14/11 at 2:46 PM, sha...@google.com (Shabsi Walfish) wrote: > > This depends on what you consider to be the basic use case. Generating >> long-lived cryptographic keys absolutely requires high quality entropy... >&g

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
such an attack may exist. If this is a concern in your application, use */dev/random* instead. To be honest, I'm surprised if even OpenSSL reads from /dev/urandom instead of /dev/random. Shabsi On Mon, Feb 14, 2011 at 3:36 PM, Glenn Maynard wrote: > On Mon, Feb 14, 2011 at 5:46 PM, Shabsi

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
ony feature-rich take on a > crypto library. > > Adam > > > On Mon, Feb 14, 2011 at 2:37 PM, Shabsi Walfish wrote: > > It'd be nice if there was at least a way to explicitly detect if you were > > getting "weaker" entropy... In linux, for example, t

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
It'd be nice if there was at least a way to explicitly detect if you were getting "weaker" entropy... In linux, for example, there is a /proc filesystem entry (/proc/sys/kernel/random/entropy_avail) that indicates how much entropy is available in the pool. Shabsi On Mon, Feb 14, 2011 at 2:30 PM,

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
On Mon, Feb 14, 2011 at 12:01 PM, Shabsi Walfish wrote: > > > On Mon, Feb 14, 2011 at 11:31 AM, Adam Barth wrote: > >> On Mon, Feb 14, 2011 at 8:31 AM, Mark S. Miller wrote: >> >>> On Mon, Feb 14, 2011 at 2:47 AM, Adam Barth wrote: >>> >>>&g

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
Re-posting for es-discuss On Mon, Feb 14, 2011 at 12:01 PM, Shabsi Walfish wrote: > > > On Mon, Feb 14, 2011 at 11:31 AM, Adam Barth wrote: > >> On Mon, Feb 14, 2011 at 8:31 AM, Mark S. Miller wrote: >> >>> On Mon, Feb 14, 2011 at 2:47 AM, Adam Barth wrote: &

Re: [whatwg] Cryptographically strong random numbers

2011-02-14 Thread Shabsi Walfish
Re-posting for es-discuss On Mon, Feb 14, 2011 at 8:30 AM, Shabsi Walfish wrote: > I think a good source of cryptographically secure entropy is _much_ higher > priority than any other crypto related APIs you might consider > standardizing... given a good source of entropy, everythin