lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 19 May 2014 19:18:48 -0400
From:	Jörn Engel <joern@...fs.org>
To:	"H. Peter Anvin" <hpa@...or.com>
Cc:	Theodore Ts'o <tytso@....edu>, lkml <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] random: mix all saved registers into entropy pool

On Mon, 19 May 2014 16:05:06 -0700, H. Peter Anvin wrote:
> On 05/19/2014 03:39 PM, Jörn Engel wrote:
> > 
> > I would feel fairly confident giving this .25 bits of entropy per
> > event.  With 40% unique hashes and assuming at most 1 bit of entropy
> > for a unique hash, that is a fairly conservative underestimate.
> 
> Sure, but that is for a specific workload.

The workload is called boot.  That is one of the two critical ones -
the other being a cloned VM.  If we can gather enough entropy during
boot and somehow avoid the cloned VM problem, we have won.  No more
need to feed in entropy from the previous run, which on many embedded
systems won't happen anyway.

If you complained about the limited selection of hardware I tested on,
you would be right.  So far it has been x86 kvm and an x86 notebook.
It would be great to get numbers for some embedded system with arm or
mips as well.

Jörn

--
When in doubt, punt.  When somebody actually complains, go back and fix it...
The 90% solution is a good thing.
-- Rob Landley
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ