[FreeBSD-Announce] FreeBSD Security Advisory
FreeBSD-SA-08:11.arc4random
Stanislav Sedov
stas at FreeBSD.org
Mon Nov 24 14:17:22 PST 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Mon, 24 Nov 2008 10:07:18 -0800 (PST)
Nate Eldredge <neldredge at math.ucsd.edu> mentioned:
> Upon reading this, my first question was whether the weakness applies to
> the random numbers supplied by /dev/random. If it does, then userspace has
> been getting non-random values, and things like PGP and SSH keys could be
> compromised. It might be good for secteam to clarify this, IMHO.
>
Userland applications are unaffected ssh keys included. /dev/[u]?random
receives entropy from Yarrow, not from arc4random and feeded with saved
entropy upon boot by /etc/rc.d/initrandom.
Only kernel services that rely on arc4random(9) is vulnerable.
- --
Stanislav Sedov
ST4096-RIPE
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAkkrI2cACgkQK/VZk+smlYGvrwCfTEuy+4AIk/b6l6bxRX0tcVs0
PZMAniLO3ltjq5232cErhAtB7u5SJI4J
=UmVN
-----END PGP SIGNATURE-----
More information about the freebsd-security
mailing list