[147880] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [RNG] /dev/random initialisation

daemon@ATHENA.MIT.EDU (tytso@mit.edu)
Tue Oct 29 12:28:26 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 29 Oct 2013 08:07:28 +0000
From: tytso@mit.edu
To: Sandy Harris <sandyinchina@gmail.com>
In-Reply-To: <20131028220401.GB31746@thunk.org>
X-SA-Exim-Mail-From: tytso@thunk.org
Cc: Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Mon, Oct 28, 2013 at 06:04:01PM -0400, Theodore Ts'o wrote:
> (There is another problem caused by proprietary binary drivers from
> !@#@! proprietary chips from a company whose name shall remain
> starting with the letter Q, forcing some home routers to still be
> using ancient, years-old 2.6 kernels, but that's not a problem under
> my control.  Said 2.6 kernels probably have huge numbers of zero-day
> flaws, some of which might allow a remote adversary to be able to
> execute a buffer overflow attack in kernel space, making flaws in the
> random number generator somewhat irrelevant...)

One addendum.  Some insecurities may be brought to you by the letter
'B', and not just 'Q'....

					- Ted
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post