BugTraq
[ANNOUNCE] glibc heap protection patch Dec 01 2003 07:31PM
William Robertson (wkr cs ucsb edu) (2 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 02 2003 02:03PM
Stefan Esser (stefan suspekt org) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 02 2003 05:16PM
William Robertson (wkr cs ucsb edu) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 03 2003 01:01PM
Stefan Esser (se nopiracy de) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 03 2003 10:25PM
William Robertson (wkr cs ucsb edu)
Re: [ANNOUNCE] glibc heap protection patch Dec 02 2003 11:27AM
Eugene Tsyrklevich (eugene securityarchitects com) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 02 2003 07:33PM
William Robertson (wkr cs ucsb edu) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 03 2003 07:54AM
Han Boetes (han mijncomputer nl) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 04 2003 05:42PM
Adam Shostack (adam homeport org) (1 replies)
Re: [ANNOUNCE] glibc heap protection patch Dec 04 2003 10:25PM
Jim Knoble (jmknoble pobox com)
Circa 2003-12-04 12:42:26 -0500 dixit Adam Shostack:

: On Wed, Dec 03, 2003 at 08:54:11AM +0100, Han Boetes wrote:
: | I ported arc4random from OpenBSD to linux some time ago. All I had to
: | do was to change the sysctl:
: |
: | http://www.xs4all.nl/~hanb/software/arc4random.tar.bz2
:
: Can you explain why it's better than the kernel's randomness pool?

The arc4random() function does not deplete the Linux kernel's entropy
pool, as reading from /dev/random does. As long as arc4random() is
properly seeded from /dev/random to begin with (and periodically stirred
with more entropy from /dev/random), it's perfectly good unpredictable
pseudorandom data, suitable for most anything except actually generating
cryptographic keys.

OpenBSD uses arc4random() as the basis for the mkstemp() function to
generate unpredictable temporary filenames, for example.

In sum, using a properly seeded arc4random() under Linux is similar to
reading from /dev/urandom, but it uses the ARC4 algorithm to generate
the pseudorandom data rather than the undocumented algorithm used by
Linux's /dev/urandom.

--
jim knoble | jmknoble (at) pobox (dot) com [email concealed] | http://www.pobox.com/~jmknoble/
(GnuPG fingerprint: 31C4:8AAC:F24E:A70C:4000::BBF4:289F:EAA8:1381:1491)
.....................................................................
:"The methods now being used to merchandise the political candidate :
: as though he were a deodorant positively guarantee the electorate :
: against ever hearing the truth about anything." --Aldous Huxley :
:...................................................................:

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus