Subject: Re: replace kernel random number function
To: None <tech-security@netbsd.org>
From: Theo de Raadt <deraadt@cvs.openbsd.org>
List: tech-security
Date: 10/22/2000 02:52:18
by mail.netbsd.org with SMTP; 22 Oct 2000 08:53:02 -0000
by cvs.openbsd.org (8.10.1/8.10.1) with ESMTP id e9M8qJK09053
for <tech-security@netbsd.org>; Sun, 22 Oct 2000 02:52:19 -0600 (MDT)
Message-Id: <200010220852.e9M8qJK09053@cvs.openbsd.org>
To: tech-security@netbsd.org
Subject: Re: replace kernel random number function
In-reply-to: Your message of "Sat, 21 Oct 2000 08:02:02 +0900."
<20001020230203.097CB7E46@starfruit.itojun.org>
Date: Sun, 22 Oct 2000 02:52:18 -0600
From: Theo de Raadt <deraadt@cvs.openbsd.org>
> i plan to replace kernel random(9) with libc random(3) code,
> or arc4random. any comments?
>
> current random(9) is too weak, and allows security threat like we saw
> with TCP ISS guessing. libc random(3) code looks enough strong for
> polinomial random number generator.
be careful.
last i checked, the scheduler requires random() to be a LCG.
that is why we left random alone, and everything else calls something
else.