Subject: Re: replace kernel random number function
To: None <tech-security@netbsd.org>
From: Steven M. Bellovin <smb@research.att.com>
List: tech-security
Date: 10/22/2000 11:56:44
by mail.netbsd.org with SMTP; 22 Oct 2000 18:48:34 -0000
by mail-green.research.att.com (Postfix) with ESMTP
id BB90A1E00B; Sun, 22 Oct 2000 14:48:33 -0400 (EDT)
by postal.research.att.com (8.8.7/8.8.7) with ESMTP id OAA05398;
Sun, 22 Oct 2000 14:48:32 -0400 (EDT)
by smb.research.att.com (Postfix) with ESMTP
id 5A0A435DC3; Sun, 22 Oct 2000 11:56:44 -0400 (EDT)
From: "Steven M. Bellovin" <smb@research.att.com>
To: tech-security@netbsd.org
Cc: tech-kern@netbsd.org
Subject: Re: replace kernel random number function
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Sun, 22 Oct 2000 11:56:44 -0400
Message-Id: <20001022155644.5A0A435DC3@smb.research.att.com>
In message <20001020230203.097CB7E46@starfruit.itojun.org>, Jun-ichiro itojun H
agino writes:
> i plan to replace kernel random(9) with libc random(3) code,
> or arc4random. any comments?
>
> current random(9) is too weak, and allows security threat like we saw
> with TCP ISS guessing. libc random(3) code looks enough strong for
> polinomial random number generator.
>
>itojun
>
Where will you get the seeds? That's the really hard part.
arc4 (as a cipher) is not (quite) as random as one would like, in a
cryptographic sense, though it's probably adequate for your purposes.
The right thing to do would be to port yarrow (see www.counterpane.com,
though I don't have the link available just now and I'm offline when
writing this). Unfortunately, it's filled with lots of DLL-ish things.
--Steve Bellovin