Re: Entropy available for luksFormat during GNU/Linux installs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Jan 24, 2010 at 03:02:05PM +0100, Heinz Diehl wrote:
> On 24.01.2010, Arno Wagner wrote: 
> 
> > "As  a  general rule,  /dev/urandom  should  be  used  for everything 
> >  except long-lived GPG/SSL/SSH keys."
> >  ^^^^^^ 
> 
> Why?
> 
> Is the output of urandom somehow more predictable than random?

In a low environmental Entropy situation for a newly installed
system, it is. For example it will give you a 512 bit key, even
if it has only gathered 32 bits of entropy. The attacker then
needs to try all 512 bit keys generated with the possible
different 32 bit initializations to find the key. It is not
an attack that really matters when there is a user at the
keyboard, and a mouse in use. Think of fully automated
installation with no user interaction on a very simple
system not connected to the network.

/dev/random will, in contrast, make you wait until it
has gathered signbificantly more entropy than the 512 bits
before giving you the key.

Arno

-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux