Re: Security of piping unencrypted keyfile through named pipe

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



* Toby <tobia.conforto@xxxxxxxx> wrote:

> cmd="head -c2925 /dev/urandom | uuencode -m - | sed -n 2,$((N+1))p |
>      gpg -c -a -o ${KEYFILE}"
> rxvt +sb -geometry 80x1 -fn fixed -cr blue -T Password -e sh -c "$cmd"

on a sidenote, using /dev/urandom is a bad idea. f.e. the standard
slackware install and other distros as well have the following code
in /etc/rc.d/rc.S:

# Carry an entropy pool between reboots to improve randomness.
if [ -f /etc/random-seed ]; then
  echo "Using /etc/random-seed to initialize /dev/urandom."
  cat /etc/random-seed > /dev/urandom
fi
# Use the pool size from /proc, or 512 bytes:
if [ -r /proc/sys/kernel/random/poolsize ]; then
  dd if=/dev/urandom of=/etc/random-seed count=1 bs=$(cat
/proc/sys/kernel/random/poolsize) 2> /dev/null
else
  dd if=/dev/urandom of=/etc/random-seed count=1 bs=512 2> /dev/null
fi
chmod 600 /etc/random-seed

-- 
Bastard Administrator in $hell

Attachment: pgpXApYjS04mS.pgp
Description: PGP signature


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux