[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEW7ACmAkk9hjEh5-pvQ_YD+h=ukk7zMo9CH17CznJCAs_jGFQ@mail.gmail.com>
Date: Sun, 19 Aug 2012 15:12:17 -0700
From: Dan Kaminsky <dan@...para.com>
To: Ben Laurie <ben@...ks.org>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: DakaRand
On Sun, Aug 19, 2012 at 3:03 PM, Ben Laurie <ben@...ks.org> wrote:
> On Sun, Aug 19, 2012 at 9:28 PM, Dan Kaminsky <dan@...para.com> wrote:
> >
> > On Sun, Aug 19, 2012 at 10:13 AM, Ben Laurie <ben@...ks.org> wrote:
> >>
> >> On Sun, Aug 19, 2012 at 5:42 PM, Dan Kaminsky <dan@...para.com> wrote:
> >> > entropy gathering has gotten *worse* (via abandonment of interrupts),
> >> > not
> >> > better.
> >>
> >> Entropy gathering in _one particular OS_. Credit where its due, please.
> >
> >
> > My understanding is that bad keys were detected on more than just Linux,
> > which implies starvation on everything on everything not out of Redmond.
> >
> > What interesting approaches are you aware of that deserve credit? Not a
> > rhetorical question, I'm genuinely curious.
>
> I was referring to the abandonment of interrupts in Linux. You think
> that other OSes have got worse at entropy gathering? And when did
> "more than Linux" start implying "not Windows"?
>
My assumption is that the other Unixes weren't looking at interrupt timing
to begin with, i.e. they've always been as starved for entropy as Linux
eventually became. That being said, does VXWorks even *have* an OS
provided strong random number generator?
Windows has CryptGenRandom, which AFAIK doesn't block, and survives
everything but VM suspend/restore.
--Dan
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists