BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] How do I add entropy?
- Subject: [Discuss] How do I add entropy?
- From: kentborg at borg.org (Kent Borg)
- Date: Tue, 09 Sep 2014 09:28:00 -0400
- In-reply-to: <4d05e83551ba4859aefa541d74d97415@CO2PR04MB684.namprd04.prod.outlook.com>
- References: <2091574.2kyEmHr34c@thinkpad> <CAAbKA3VZ3X_59jGL9SJD2CfiY2u58+2ddr9uV4YA-APXbtpLpA@mail.gmail.com> <540B8195.8050008@horne.net> <ca94bee20db44a79b2f8d6a27347a0f9@CO2PR04MB684.namprd04.prod.outlook.com> <540C9F77.5070104@borg.org> <ee08cfb320824d08a5b68cd02c6be064@CO2PR04MB684.namprd04.prod.outlook.com> <540DA4EE.3010609@borg.org> <4d05e83551ba4859aefa541d74d97415@CO2PR04MB684.namprd04.prod.outlook.com>
On 09/08/2014 08:26 PM, Edward Ned Harvey (blu) wrote: > The problem with bad entropy sources would be overestimating their > entropy. Entropy calculation is doomed unless one can define and control larger system boundaries--not just software but complete hardware with physical protections around it. But I can see why one would still want to ~sort~ of try. Logically, if the crypto is good, entropy accounting should not matter, but when one is feeding crypto it is wrong to put too much on, say, a counter driving AES... Wanting real entropy as an input is good. Okay, so make some lower-boundary estimations, but don't toss entropy just because you don't know the data you are being fed. I think it is reasonable for the Linux kernel to have an RNG, but the kernel will never define a large enough boundary to really know its entropy sources. Being strict about entropy sources logically reduces to removing Linux's hybrid entropy-pool/cryptographic RNG altogether. Anyone who is marching down that logical path is the wrong person to maintain random.c. Yes, Linus can be, er, loud, and much of the time it is refreshing, but he does have a pragmatic engineering perspective and, as far as I have observed, will see reality...maybe after a delay. He does get pretty amazing results in his personnel management to produce a kernel that runs well on an astounding range of hardware. > The most egregious offense was the exclusive use of > ThreadedSeedGenerator class, which produced output that sometimes lzma > compressed to approx 11% of its original size. That's bad. Really, > really bad. RNGs have the risk of failing silently. But this isn't even a silent failure. Jeeze. -kb
- Follow-Ups:
- [Discuss] How do I add entropy?
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] How do I add entropy?
- References:
- [Discuss] How do I add entropy?
- From: bill at horne.net (Bill Horne)
- [Discuss] How do I add entropy?
- From: bill.n1vux at gmail.com (Bill Ricker)
- [Discuss] How do I add entropy?
- From: bill at horne.net (Bill Horne)
- [Discuss] How do I add entropy?
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] How do I add entropy?
- From: kentborg at borg.org (Kent Borg)
- [Discuss] How do I add entropy?
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] How do I add entropy?
- From: kentborg at borg.org (Kent Borg)
- [Discuss] How do I add entropy?
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] How do I add entropy?
- Prev by Date: [Discuss] OT: cartoon about cryptography
- Next by Date: [Discuss] How do I add entropy?
- Previous by thread: [Discuss] How do I add entropy?
- Next by thread: [Discuss] How do I add entropy?
- Index(es):