svn commit: r42962 - head/en_US.ISO8859-1/htdocs/news/status

Gabor Pali pgj at FreeBSD.org
Tue Oct 15 08:41:47 UTC 2013


Author: pgj
Date: Tue Oct 15 08:41:46 2013
New Revision: 42962
URL: http://svnweb.freebsd.org/changeset/doc/42962

Log:
  - Update the random(4) 2013Q3 entry
  
  Submitted by:	markm

Modified:
  head/en_US.ISO8859-1/htdocs/news/status/report-2013-07-2013-09.xml

Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2013-07-2013-09.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2013-07-2013-09.xml	Tue Oct 15 00:37:17 2013	(r42961)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2013-07-2013-09.xml	Tue Oct 15 08:41:46 2013	(r42962)
@@ -949,7 +949,7 @@
   </project>
 
   <project cat='kern'>
-    <title>Updating <tt>random(4)</tt></title>
+    <title>Reworking <tt>random(4)</tt></title>
 
     <contact>
       <person>
@@ -978,16 +978,55 @@
     </contact>
 
     <body>
-      <p>Update of <tt>random(4)</tt> to account for recent revelations,
-	and make more extensible, is in progress.</p>
+      <p>Random numbers require a lot more thought and preparation that
+	would naively appear to be the case.  For simulations, number
+	sequences that are repeatable but sufficiently disordered are
+	often what is required to achieve required experimental
+	duplication ability, and many programmers are familiar with
+	these.  For cryptography, it is essential that an attacker not
+	be able to predict or guess the output sequence, thus giving a
+	source of security-critical secret material for uses such as
+	passwords or "key material".</p>
+
+      <p>&os;'s random number generator, available as the pseudo-file
+	<tt>/dev/random</tt> produces unpredictable numbers intended for
+	cryptographic use, and is thus a Cryptograpically-Secured
+	Pseudo-Random Number Generator, or CSPRNG.  The security is
+	given by careful design of the output generator (based on a
+	block cipher) and input entropy accumulation queues.  The latter
+	uses hashes to accumulate stochastic information harvested from
+	various places in the kernel to provide highly unpredictable
+	input to the generator.  The algorithm for doing this, Yarrow,
+	by Schneier et al, may be found by web search.</p>
+
+      <p>&os;'s CSPRNG also allowed for certain stochastic sources,
+	deemed to be "high-quality", to directly supply the
+	<tt>random(4)</tt> device without going through Yarrow.  With
+	recent revelations over possible government surveillance and
+	involvement in the selection of these "high-quality" sources, it
+	is felt that they can no longer be trusted, and must therefore
+	also be processed though Yarrow.</p>
+
+      <p>The matter was discussed at various levels of formality at the
+	Cambridge Developer Summit in August, and at EuroBSDcon 2013 in
+	September.</p>
+
+      <p>This work is now done, and the <tt>random(4)</tt> CSPRNG is now
+	brought to a more paranoid, modern standard of distrust with
+	regard to its entropy sources.  Infrastructure work was also
+	done to facilitate certain entropy-source choices for the
+	convenience of the system administrators.</p>
+
+      <p>Future work is now going ahead with the implementation of the
+	Fortuna algorithm by Ferguson and Schneier as an upgrade or
+	alternative to Yarrow.  Initially a choice will be presented,
+	and decisions on the future of the CSPRNG processing algorithms
+	in use will be made in the future as needs arise.</p>
     </body>
 
     <help>
-      <task>Fortuna is to be an alternative for Yarrow in FreeBSD 11.x.</task>
-      <task>Yarrow may be deprecated in a couple of years.</task>
-      <task>FIPS 800-90b support is planned.</task>
-      <task>A full, in-depth review of entropy is going to be done with
-	external help.</task>
+      <task>Implement FIPS 800-90b support.</task>
+      <task>A full, in-depth review of entropy.</task>
     </help>
   </project>
 


More information about the svn-doc-all mailing list