Re: Entropy Pool Contents

2006-11-29 Thread Phillip Susi
Martin Mares wrote: No, the only safe thing the kernel can do is to add NO entropy, unless explicitly told otherwise. Ahh, I think I see where I got confused now. I thought you wanted to save and restore the entropy estimate after a reboot. I was trying to say that you don't want to/can't d

Re: Entropy Pool Contents

2006-11-28 Thread Eran Tromer
On 2006-11-28 19:42, Phillip Susi wrote: > what good does a non root user do by writing to random? If it > does not increase the entropy estimate, and it may not actually increase > the entropy, why bother allowing it? It is not guaranteed to actually increase the entropy, but it might. And in c

Re: Entropy Pool Contents

2006-11-28 Thread Martin Mares
Hello! > That is exactly my point. Since you can not tell how much randomness is > in the data you provide, you can not tell the kernel how much to add to > its entropy estimate. Instead it just has to estimate based on the > amount of data you provide. No, the only safe thing the kernel can

Re: Entropy Pool Contents

2006-11-28 Thread Phillip Susi
Martin Mares wrote: Yes, but the point is that you cannot tell how much randomness is in the data you provide. That is exactly my point. Since you can not tell how much randomness is in the data you provide, you can not tell the kernel how much to add to its entropy estimate. Instead it jus

Re: Entropy Pool Contents

2006-11-28 Thread Martin Mares
Hello! > I still don't see how feeding tons of zeros ( or some other carefully > crafted sequence ) in will not decrease the entropy of the pool ( even > if it does so in a way that is impossible to predict ), but assuming it > can't, what good does a non root user do by writing to random? Eve

Re: Entropy Pool Contents

2006-11-28 Thread Martin Mares
Hello! > You aren't dumping and restoring the entropy pool; you are dumping > random data generated by the pool, and using that data to stir the new > entropy pool after the next boot. There is no direct relationship > between the entropy of the old and new pools. The kernel needs to > decid

Re: Entropy Pool Contents

2006-11-28 Thread Phillip Susi
First, please don't remove the Cc: list. David Wagner wrote: Sorry, but I disagree with just about everything you wrote in this message. I'm not committing any logical fallacies. I'm not assuming it works because it would be a bug if it didn't; I'm just trying to Nope, I don't think so. If

Re: Entropy Pool Contents

2006-11-28 Thread Phillip Susi
Martin Mares wrote: I'm adding entropy, but unless I record the exact amount of entropy when dumping the pool, I don't know how much I am adding, so using any fixed number is obviously wrong. You aren't dumping and restoring the entropy pool; you are dumping random data generated by the pool,

Re: Entropy Pool Contents

2006-11-28 Thread Martin Mares
Hello! > After a reboot the entropy estimate starts at zero, so if you are adding > data to the pool from the previous boot, you DO want the estimate to > increase because you are, in fact, adding entropy. I'm adding entropy, but unless I record the exact amount of entropy when dumping the pool

Re: Entropy Pool Contents

2006-11-28 Thread Phillip Susi
Martin Mares wrote: More importantly, it should be possible for root to write to /dev/random _without_ increasing the entropy count, for example when restoring random pool contents after reboot. In such cases you want the pool to contain at least some unpredictable data before real entropy arrive

Re: Entropy Pool Contents

2006-11-28 Thread Eran Tromer
On 2006-11-27 23:52, Kyle Moffett wrote: > Actually, our current /dev/random implementation is secure even if the > cryptographic algorithms can be broken under traditional circumstances. This is far from obvious, and in my opinion incorrect. David explained this very well in his follow-up. Other

Re: Entropy Pool Contents

2006-11-28 Thread Martin Mares
Hello! > - Whether you automatically bump up the entropy estimate when > root users write to /dev/random is a design choice where you could > reasonably go either way. On the one hand, you might want to ensure > that root has to take some explicit action to allege that it is > p

Re: Entropy Pool Contents

2006-11-28 Thread David Wagner
Continuing the tangent: Henrique de Moraes Holschuh wrote: >On Mon, 27 Nov 2006, Ben Pfaff wrote: >> [EMAIL PROTECTED] (David Wagner) writes: >> > Well, if you want to talk about really high-value keys like the scenarios >> > you mention, you probably shouldn't be using /dev/random, either; you >

Re: Entropy Pool Contents

2006-11-28 Thread Henrique de Moraes Holschuh
On Mon, 27 Nov 2006, Ben Pfaff wrote: > [EMAIL PROTECTED] (David Wagner) writes: > > Well, if you want to talk about really high-value keys like the scenarios > > you mention, you probably shouldn't be using /dev/random, either; you > > should be using a hardware security module with a built-in FIP

Re: Entropy Pool Contents

2006-11-27 Thread Ben Pfaff
[EMAIL PROTECTED] (David Wagner) writes: > Well, if you want to talk about really high-value keys like the scenarios > you mention, you probably shouldn't be using /dev/random, either; you > should be using a hardware security module with a built-in FIPS certified > hardware random number source.

Re: Entropy Pool Contents

2006-11-27 Thread David Wagner
Warning: tangent with little practical relevance follows: Kyle Moffett wrote: >Actually, our current /dev/random implementation is secure even if >the cryptographic algorithms can be broken under traditional >circumstances. Maybe. But, I've never seen any careful analysis to support this or

Re: Entropy Pool Contents

2006-11-27 Thread Gunter Ohrner
Phillip Susi wrote: >> I'm mainly wondering why writing stuff to /dev/*random does not change >> the entropy from zero to at least any low non-zero value... > I ran into this the other day myself and when I investigated the kernel > code, I found that writes to /dev/random do accept the data into t

Re: Entropy Pool Contents

2006-11-27 Thread Kyle Moffett
On Nov 27, 2006, at 15:40:16, David Wagner wrote: Phillip Susi wrote: David Wagner wrote: Nope, I don't think so. If they could, that would be a security hole, but /dev/{,u}random was designed to try to make this impossible, assuming the cryptographic algorithms are secure. Actually, our

Re: Entropy Pool Contents

2006-11-27 Thread David Wagner
Phillip Susi wrote: >David Wagner wrote: >> Nope, I don't think so. If they could, that would be a security hole, >> but /dev/{,u}random was designed to try to make this impossible, assuming >> the cryptographic algorithms are secure. >> >> After all, some of the entropy sources come from untrus

Re: Entropy Pool Contents

2006-11-27 Thread Phillip Susi
David Wagner wrote: Nope, I don't think so. If they could, that would be a security hole, but /dev/{,u}random was designed to try to make this impossible, assuming the cryptographic algorithms are secure. After all, some of the entropy sources come from untrusted sources and could be manipulate

Re: Entropy Pool Contents

2006-11-27 Thread David Wagner
Phillip Susi wrote: >Why are non root users allowed write access in the first place? Can't >the pollute the entropy pool and thus actually REDUCE the amount of good >entropy? Nope, I don't think so. If they could, that would be a security hole, but /dev/{,u}random was designed to try to make

Re: Entropy Pool Contents

2006-11-27 Thread Phillip Susi
Chris Friesen wrote: I believe the idea was that you don't want random users being able to artificially inflate your entropy count. So the kernel tries to make use of entropy entered by regular users (by stirring it into the pool) but it doesn't increase the entropy estimate unless root says i

Re: Entropy Pool Contents

2006-11-27 Thread Phillip Susi
Gunter Ohrner wrote: IMHO something really fishy's going on there. If I explicitely write data into the pool, it shouldd not stay at "zero", from wwhat I understood about how /dev/*random work. I'm mainly wondering why writing stuff to /dev/*random does not change the entropy from zero to a

Re: Entropy Pool Contents

2006-11-27 Thread Chris Friesen
Phillip Susi wrote: I ran into this the other day myself and when I investigated the kernel code, I found that writes to /dev/random do accept the data into the entropy pool, but do NOT update the entropy estimate. In order to do that, you have to use a root only ioctl to add the data and upd

Re: Entropy Pool Contents

2006-11-25 Thread Folkert van Heusden
> Hornburg:~# cat /proc/sys/kernel/random/entropy_avail > 0 Please have a look at: audio-entropyd: http://www.vanheusden.com/aed/ fills the kernel entropy buffer with noise from your audio-card video-entropyd: http://www.vanheusden.com/ved/ fills the kernel entropy buffer with noise from a video4l