lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 18 Aug 2012 17:21:01 -0700
From: Dan Kaminsky <>
To: coderman <>
Subject: Re: how i stopped worrying and loved the backdoor

Yeah, turns out RNG's *aren't* on most motherboards.  Thus, DakaRand.

The biggest surprise of this entire adventure is that DakaRand seems to
work inside of VM's too.  Didn't expect that at all.  But then, I think
it's going to take some time to analyze what's going on here.

On Sat, Aug 18, 2012 at 4:00 PM, coderman <> wrote:

> Dan just released "DakaRand"
> src
> while admitting that "Matt Blaze has essentially disowned this
> approach, and seems to be honestly horrified that I’m revisiting it"
> and "Let me be the first to say, I don’t know that this works." this
> mode would greatly reduce, maybe eliminate the incidence of key
> duplication in large sample sets (e.g. visibly poor entropy for key
> generation)
> the weak keys[0] authors clearly posit that they have detected merely
> the most obvious and readily accessible poor keys, and that further
> attacks against generator state could yield even more vulnerable
> pairs... you have been warned :P
> the solution is adding hw entropy[1][2] to the mix. anything less is
> doing it wrong!
> if you don't have hw entropy, adding dakarand is better than not.
> 0. "Mining Your Ps and Qs: Detection of Widespread Weak Keys in
> Network Devices - Extended"
> 1. "Intel RNG"
>  see also by thread:
> 2. xstore
> X. LD 50 radiation exposure of the common pigeon. entropy via carrier
> pigeon (DRAFT)
>  ;P
> P.P.S: if you're not passing valid hw entropy into VM guests, you're
> also doing it wrong. even enough passed at boot is sufficient,
> provided key generation is secure. always a million caveats... and
> adding dakarand to guests is better than not.
> On Wed, Jul 18, 2012 at 12:35 PM, coderman <> wrote:
> > On Fri, Dec 24, 2010 at 5:08 PM, Dan Kaminsky <> wrote:
> >> ...
> >> Don't we have hardware RNG in most motherboard chipsets nowadays?
> >
> > clearly not enough of them!
> >
> > 'Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network
> Devices'
> >

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists