DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] Entropy available for luksFormat during GNU/Linux installs
@ 2010-01-24  6:17 Roscoe
  2010-01-24 10:50 ` Milan Broz
  0 siblings, 1 reply; 16+ messages in thread
From: Roscoe @ 2010-01-24  6:17 UTC (permalink / raw)
  To: dm-crypt

Hey folks,

A while ago the following paper regarding the Linux RNG was in the news:
http://www.pinkas.net/PAPERS/gpr06.pdf

It describes issues with environments utilizing read only storage
[KNOPPIX and WRT are named].

At the time I thought "Hey, just like installing from CD!".
Since then, I've always been a bit suspicious of the security factor
of partitions created within an installer.

Has there been much consideration as to this matter within OS
installers? Does anyone suspect any latent issues?

If we take a Debian text installs with no network, that removes NIC
generated interrupts and the mouse as sources of entropy, and
considering setting up partitions [and consequently LUKS/LVM/RAID] is
one of the first things you do within the installer, I start to become
a bit suspicious of the quality of the 512 MK bits pulled for
AES-256-XTS.


Regards,

-- Roscoe

PS [Confession]: Crypto/Maths/CS aren't my fields so I only skimmed the paper!

^ permalink raw reply	[flat|nested] 16+ messages in thread
* Re: [dm-crypt] Entropy available for luksFormat during GNU/Linux installs
@ 2010-01-24 18:12 Si St
  0 siblings, 0 replies; 16+ messages in thread
From: Si St @ 2010-01-24 18:12 UTC (permalink / raw)
  To: dm-crypt

Yes. Compared to /dev/random the /dev/urandom is actually a "program" with certain predictability. /dev/random collects its values from real randomness, at least better than urandom.
Look at the "man urandom":

The random number generator gathers environmental noise from device drivers and other sources into an entropy pool....

A read from the /dev/urandom device will not block waiting for more entropy.  As a result, if there is not sufficient entropy in the entropy pool, the returned values are theoretically vulnerable to a cryptographic attack  on  the  algorithms  used  by  the driver. 

But actually how weak a feature this is depends on the practical results achieved from the attacks. This may of course depend on the WILL, TIME, and SOFTWARE in use. All cryptography have weaknesses, but it takes time to get hold of them, - like it took time to crack the algoritm of simple DES. But in the end they got it.

------------------------------------------------------------------------------------------------
Heia Fedje!
------------------------------------------------------------------------------------------------

> ----- Original Message -----
> From: "Heinz Diehl" <htd@fancy-poultry.org>
> To: dm-crypt@saout.de
> Subject: Re: [dm-crypt] Entropy available for luksFormat during GNU/Linux installs
> Date: Sun, 24 Jan 2010 15:02:05 +0100
> 
> 
> On 24.01.2010, Arno Wagner wrote:
> 
> > "As  a  general rule,  /dev/urandom  should  be  used  for 
> > everything  except long-lived GPG/SSL/SSH keys."
> >  ^^^^^^
> 
> Why?
> 
> Is the output of urandom somehow more predictable than random?
> 
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt

>


-- 
_______________________________________________
Surf the Web in a faster, safer and easier way:
Download Opera 9 at http://www.opera.com

Powered by Outblaze

^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2010-03-23  8:43 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-01-24  6:17 [dm-crypt] Entropy available for luksFormat during GNU/Linux installs Roscoe
2010-01-24 10:50 ` Milan Broz
2010-01-24 13:11   ` Arno Wagner
2010-01-24 14:02     ` Heinz Diehl
2010-01-24 14:31       ` Rick Moritz
2010-01-24 16:56         ` Heinz Diehl
2010-01-24 23:11           ` Arno Wagner
2010-01-24 23:03       ` Arno Wagner
2010-01-25 11:25         ` Milan Broz
2010-02-03  0:45           ` Roscoe
2010-02-03  6:21             ` Arno Wagner
2010-02-03  7:57               ` Arno Wagner
2010-02-03 12:31                 ` Roscoe
2010-02-03  8:56             ` Milan Broz
     [not found]               ` <cf657bae1002030430l3b0f4768x19e917466b5664bb@mail.gmail.com>
     [not found]                 ` <4B697D55.5020304@redhat.com>
     [not found]                   ` <cf657bae1002031231s6dd17c8bq118e5c5276c31b84@mail.gmail.com>
2010-03-23  8:43                     ` Roscoe
  -- strict thread matches above, loose matches on Subject: below --
2010-01-24 18:12 Si St

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox