LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 08-11-2020, 01:59 PM   #46
abga
Senior Member
 
Registered: Jul 2017
Location: EU
Distribution: Slackware
Posts: 1,634

Rep: Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929

Quote:
Originally Posted by GazL View Post
@abga,
The linux devs claim that urandom is a "cryptographicly secure rng", and until someone proves that it's not, that's good enough for me.
Quite the contrary, they warn you in the kernel 5.6 with the flag GRND_INSECURE, should you not choose to ignore it, because the system can enter a state where the entropy gets limited/depleted and the output of the newly implemented RNG mechanism resembles to some extent the fallacy described in chapter:
6.1.1. The Fallacy of Complex Manipulation
https://tools.ietf.org/html/rfc4086

What I learned during this discussion is that the kernel folks want to get rid of the responsibility of providing a crypto secure RNG on OS level, I do understand them, it's not a trivial task and they are under constant pressure from the userspace crypto devs. I wasn't prepared for the depth of the rabbit hole and got really worried now that in this kernel RNG devs & userspace crypto devs "war" it's the end users (losers) that will have to suffer.

It's very dangerous to jump to simplifying conclusions when not understanding the underlying basics about cryptography, especially in a manner that could negatively influence other people and, especially on key component (crypto) that, unfortunately, is the only one on which the whole trust system is based on.
 
Old 08-14-2020, 11:04 PM   #47
Richard Cranium
Senior Member
 
Registered: Apr 2009
Location: McKinney, Texas
Distribution: Slackware64 15.0
Posts: 3,858

Rep: Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225
Quote:
Originally Posted by abga View Post
I think I would be able to prove that there will be never enough lava lamps for achieving true randomness
Well, many moons ago, this thread showed up around these parts. I do believe that is one of the reasons haveged is available. I think there's a changelog that talks about that very thing.

(All hail @denydias, BTW, for that person's analysis of the problem. Some of you may well not agree with the solution, but that person saw a problem that most of us didn't at the time.)
 
1 members found this post helpful.
Old 08-15-2020, 06:59 AM   #48
gus3
Member
 
Registered: Jun 2014
Distribution: Slackware
Posts: 490

Rep: Reputation: Disabled
And all hail Richard Cranium for getting me to read an entire thread on a Saturday morning when I'm not supposed to be working. That's quite the achievement.
 
1 members found this post helpful.
Old 08-15-2020, 04:42 PM   #49
abga
Senior Member
 
Registered: Jul 2017
Location: EU
Distribution: Slackware
Posts: 1,634

Rep: Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929Reputation: 929
Indeed, all hail to @Richard Cranium, not only for the good lecture, but also because in post #6 from the linked thread Richard already understood the problem and offered a solution. Now thanks to the investigative efforts from that thread (credits included for @denydias' observation) we got an "automated key striking" -> "entropy generating" haveged.

There were some details about the actual (kernel) /dev/random and its usage by OpenSSL I wanted to investigate further and had no time until now.
EdGr's statement in the first post about the system not using /dev/random got me asking myself: What is its actual purpose then? (clarified already) and what does OpenSSL use?
I wasn't able to find a short OpenSSL architecture design document focused only on the RNG, but got a satisfactory explanation instead, in this security focused forum: - second answer:
https://security.stackexchange.com/q...andom-directly

Last edited by abga; 08-15-2020 at 04:44 PM. Reason: third = second
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
atd and haveged daemons chrisVV Slackware 12 06-16-2018 12:27 PM
Can't select gnome panel properties after hide buttons are turned off blixel Linux - Software 2 10-22-2003 05:05 PM
Can't select gnome panel properties after hide buttons are turned off blixel Linux - Software 0 10-16-2003 10:01 AM
AA turned off, but still works on Opera 7.20b4... mks Linux - Software 1 08-24-2003 10:58 AM
sh: can't access tty, job control turned off tgardner Linux - Software 1 06-07-2003 12:39 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 11:30 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration