init.d/urandom : saving random-seed

Henrique de Moraes Holschuh hmh at debian.org
Sun Aug 1 10:34:58 EDT 2010


(Please keep all CCs).

On Sun, 01 Aug 2010, Jerry Leichter wrote:
> file might be reused:  Stir in the date and time and anything else
> that might vary - even if it's readily guessable/detectable - along

Well, yes, we have several *guessable* sources of variable data available
during early userspace that we could use.  We can also distill them through
sha256.

But it would add very little variation across reboots of the same box, and
that variation is easily guessable.  Worse, the entire contents of the base
data is also guessable, *and* almost all of it is available after boot (and
that does include the date/time).

It would be something like this:
( dmesg | sha256 ; ( date -u ; date +%N ) | sha256) | dd of=/dev/urandom

In addition to the usual shuffling done using the seed file.

However, someone would have to put forth a good, solid technical explanation
of why the above would give a measurable increase on the security of a
system where the seed file does not exist (or is being reused due to a
failure that caused an early reboot).

As I said, the entire data used (dmesg, system time) is available and/or
guessable to very high precision after boot [when a seed file has not been
refreshed], AND the variation between boots can be rather small *and* that
variation is also guessable.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list