TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Entropy Loss and Output Predictability in the Libgcrypt PRNG [pdf]

44 点作者 tshtf超过 8 年前

4 条评论

tptacek超过 8 年前
Don&#x27;t. Use. Userspace. Random. Number. Generators.<p>It is 2016. There is no business for any major tool to be shipping a dependency on a userspace random number generator like this.<p><a href="http:&#x2F;&#x2F;sockpuppet.org&#x2F;blog&#x2F;2014&#x2F;02&#x2F;25&#x2F;safely-generate-random-numbers&#x2F;" rel="nofollow">http:&#x2F;&#x2F;sockpuppet.org&#x2F;blog&#x2F;2014&#x2F;02&#x2F;25&#x2F;safely-generate-random...</a><p>It&#x27;s not enough for us to stop fielding new software with broken userspace random (all userspace random is broken random). We need to go back through all the software, find all the userspace RNGs, and replace them with urandom reads
评论 #12318060 未加载
评论 #12317384 未加载
评论 #12317898 未加载
评论 #12318986 未加载
advisedwang超过 8 年前
The GPG folks don&#x27;t currently recommend revoking keys based on this: <a href="https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-announce&#x2F;2016q3&#x2F;000395.html" rel="nofollow">https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-announce&#x2F;2016q3&#x2F;0003...</a>
weinzierl超过 8 年前
&gt; [...] the flaw makes a part of the PRNG output completely predictable. This bug exists since 1998 in all GnuPG and Libgcrypt versions [...]<p>&gt; Please note that this document makes no claims about the effect of the flaw on the security of generated keys or other artifacts.
zeveb超过 8 年前
Granted, Fortuna didn&#x27;t exist in 1998 (it dates to 2003) — but why oh why don&#x27;t gcrypt &amp; the kernel use it now?
评论 #12317405 未加载
评论 #12316671 未加载