tech-security archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: FreeBSD rnd bug



Le 19/02/2015 09:47, Fredrik Pettai a écrit :
Did you see this:

https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html

I know that the rnd code in NetBSD has been reworked several times lately,
is the NetBSD design very different from FreeBSDs? or are they fairly equal?

They are completely different. There are two PRNG:
- a "fast" one (chacha20) which is consumed in places where plain randomization is required in performance critical paths (ASLR, TCP sequence, anon ports...); - a "strong" one (NIST CTR DRBG with AES 128 as block cipher) for crypto related operations.

The seed for the fast RNG is obtained from the strong RNG, and the strong PRNG is initted through rndsink(9). Of course from there, quality depends on the entropy sources, but this is just to show that the call paths and APIs have nothing in common.

--
Jean-Yves Migeon


Home | Main Index | Thread Index | Old Index