[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random

Stanislav Sedov stas at FreeBSD.org
Mon Nov 24 14:17:22 PST 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 24 Nov 2008 10:07:18 -0800 (PST)
Nate Eldredge <neldredge at math.ucsd.edu> mentioned:

> Upon reading this, my first question was whether the weakness applies to 
> the random numbers supplied by /dev/random.  If it does, then userspace has 
> been getting non-random values, and things like PGP and SSH keys could be 
> compromised.  It might be good for secteam to clarify this, IMHO.
> 

Userland applications are unaffected ssh keys included. /dev/[u]?random
receives entropy from Yarrow, not from arc4random and feeded with saved
entropy upon boot by /etc/rc.d/initrandom.

Only kernel services that rely on arc4random(9) is vulnerable.

- -- 
Stanislav Sedov
ST4096-RIPE
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAkkrI2cACgkQK/VZk+smlYGvrwCfTEuy+4AIk/b6l6bxRX0tcVs0
PZMAniLO3ltjq5232cErhAtB7u5SJI4J
=UmVN
-----END PGP SIGNATURE-----


More information about the freebsd-security mailing list