TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

An Analysis of OpenSSL's Random Number Generator

77 点作者 randombit大约 9 年前

4 条评论

zer01大约 9 年前
Reminds me of one of my favorite commit logs from the LibreSSL project:<p>&quot;Do not feed RSA private key information to the random subsystem as entropy. It might be fed to a pluggable random subsystem…. What were they thinking?!&quot;<p><a href="http:&#x2F;&#x2F;opensslrampage.org&#x2F;post&#x2F;83007010531&#x2F;well-even-if-time-isnt-random-your-rsa" rel="nofollow">http:&#x2F;&#x2F;opensslrampage.org&#x2F;post&#x2F;83007010531&#x2F;well-even-if-time...</a>
评论 #11486210 未加载
ryuuchin大约 9 年前
I can&#x27;t understand Why OpenSSL continues to use it&#x27;s own PRNG implimentation when we have &#x2F;dev&#x2F;urandom and CryptGenRandom which are known to be good. This is basically what BoringSSL does (although if you have rdrand then it will get filtered through a ChaCha20 instance).<p>I&#x27;m pretty sure OpenSSL doesn&#x27;t even reseed its PRNG on Windows unless the calling application does it so I&#x27;m not sure how that&#x27;s safe either. If you look at applications using OpenSSL like OpenVPN I don&#x27;t see any calls to the PRNG init function to ensure it has enough entropy. I&#x27;m not sure of the security impact of this.
评论 #11486047 未加载
评论 #11486493 未加载
评论 #11486989 未加载
评论 #11485832 未加载
评论 #11485975 未加载
RRRA大约 9 年前
Are any OpenSSL fork vulnerable in the same way?
评论 #11485343 未加载
rootw0rm大约 9 年前
I actually have several TB of OpenSSL PRNG output (256 bit len) that I&#x27;ve been analyzing. A fairly modest sample size, but I&#x27;ve come across some interesting patterns at the bit level. It&#x27;s kind of a pain in the ass to write efficient analytics for a binary 256 bit pattern as a matter of fact.
评论 #11486172 未加载
评论 #11486547 未加载