RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-11 Thread David Schwartz
Ted T'so wrote: At this point, you've just spent reams and reams of electrons stating the obvious. Yes, for the second time, because some people *still* don't understand it. (It's quite obvious to you and me, not so obvious to the people who still don't get it.) If the endpoint is

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-11 Thread David Schwartz
Michael Sierchio wrote: Theodore Tso wrote: As the old saying goes, better to be silent, and thought to be a fool, and to speak, and remove all doubt. Well, Brahma said, even after ten thousand explanations, a fool is no wiser, but an intelligent man requires only two thousand five

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-11 Thread Kurt Roeckx
On Mon, Aug 11, 2008 at 02:50:55AM -0700, David Schwartz wrote: Ted T'so wrote: At this point, you've just spent reams and reams of electrons stating the obvious. Yes, for the second time, because some people *still* don't understand it. (It's quite obvious to you and me, not so

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-11 Thread David Schwartz
Kurt Roeckx wrote: David, I think you have a problem of not making clear what you actually mean. I'm going to give 3 examples of how I could read what you were saying so far: 1. A client connects to a server, but the server has been compromised and someone knows it's secret key. The

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-10 Thread Michael Sierchio
Are you or are you not the same David Schwartz who claimed that SSLv3 is vulnerable to MITM? If so, what have you learned since then? __ OpenSSL Project http://www.openssl.org Development Mailing

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-10 Thread David Schwartz
Michael Sierchio wrote: Are you or are you not the same David Schwartz who claimed that SSLv3 is vulnerable to MITM? If so, what have you learned since then? If a browser has a maliciously-included root certificate placed there by an attacker and is using a SOCKS proxy also

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-10 Thread Richard Salz
If a browser has a maliciously-included root certificate placed there by an attacker and ... I'm not aware of any definition of MITM that includes compromising any part of an endpoint. Could you point to one? /r$ -- STSM, DataPower Chief Programmer WebSphere DataPower SOA

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-10 Thread David Schwartz
Richard Salz wrote: If a browser has a maliciously-included root certificate placed there by an attacker and ... I'm not aware of any definition of MITM that includes compromising any part of an endpoint. Could you point to one? /r$ I didn't say you are vulnerable

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-10 Thread Theodore Tso
On Sun, Aug 10, 2008 at 07:28:30PM -0700, David Schwartz wrote: I didn't say you are vulnerable to a MITM attack that compromises the endpoint. I said that if the endpoint is compromised, you are vulnerable to MITM attacks. The attacker need not compromise the endpoint himself. He may

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-10 Thread Michael Sierchio
Theodore Tso wrote: As the old saying goes, better to be silent, and thought to be a fool, and to speak, and remove all doubt. Well, Brahma said, even after ten thousand explanations, a fool is no wiser, but an intelligent man requires only two thousand five hundred. Normally, I am fine with

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread David Shambroom
Kyle, I didn't say that /dev/urandom was safe to use for cryptographic purposes. It isn't, and I didn't then and don't now advise its use. I said it never blocks. It doesn't. So what was incorrect? Kyle Hamilton wrote: David S: to my knowledge you're at least somewhat incorrect, and

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread Kyle Hamilton
I'm sorry -- my comment was to David Schwartz (I realized both of you were named David, but failed to realize that you also had a surname that started with S). -Kyle H On Thu, Aug 7, 2008 at 11:44 AM, David Shambroom [EMAIL PROTECTED] wrote: Kyle, I didn't say that /dev/urandom was safe to

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread Kyle Hamilton
On Thu, Aug 7, 2008 at 6:59 AM, David Schwartz [EMAIL PROTECTED] wrote: Kyle Hamilton wrote: David S: to my knowledge you're at least somewhat incorrect, and part of your advice is rather dangerous to rely upon (from a cryptographic theory perspective). You are at least somewhat incorrect

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread Tomas Mraz
On Fri, 2008-08-08 at 02:52 -0700, Kyle Hamilton wrote: On Thu, Aug 7, 2008 at 6:59 AM, David Schwartz [EMAIL PROTECTED] wrote: Otherwise, many random number generators use a linear-feedback shift register with a periodicity of 2**56. That's approximately the same amount of keyspace as

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread David Schwartz
Kyle Hamilton wrote: On Thu, Aug 7, 2008 at 6:59 AM, David Schwartz [EMAIL PROTECTED] wrote: Kyle Hamilton wrote: If the pool is seeded once, the randomness will be random for as long as the amount of entropy in the seed holds out. After this, the numbers generated won't really be

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread Michael Sierchio
David Schwartz wrote: Deterministic is the antithesis of truly random. You've said some truly stupid things, David, but that one wins the prize. __ OpenSSL Project http://www.openssl.org

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread David Schwartz
David Schwartz wrote: Deterministic is the antithesis of truly random. You've said some truly stupid things, David, but that one wins the prize. Do you know of a way that an algorithmic process can produce more truly random output than it has truly random input? Or do disagree with

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread Michael Sierchio
David Schwartz wrote: do disagree with my claim that an algorithmic process can produce an very large amount of cryptographically-strong random output with a small amount of truly random input? Yes. A small amount of random input might mean that the entire state -- past, present and future

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-08 Thread David Schwartz
Micahel Sierchio: David Schwartz wrote: do disagree with my claim that an algorithmic process can produce an very large amount of cryptographically-strong random output with a small amount of truly random input? Yes. A small amount of random input might mean that the entire

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-07 Thread David Shambroom
You're right: You are completely wrong. /dev/urandom never blocks. See the man page. David Schwartz wrote: Tried many many times, even two running at the same time or poll timeout set to zero, not one instance of blocking even with od -x /dev/urandom and od -x /dev/random running

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-07 Thread Damien Miller
On Wed, 6 Aug 2008, Stanislav Meduna wrote: So what should the applications calling openssl actually do if this happens? Now the ssh/apache/... simply exit, which is bad (it left me without an access to a remote box...). Exiting is the best behaviour - continuing without a good source of

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-07 Thread David Schwartz
David Shambroom wrote: You're right: You are completely wrong. /dev/urandom never blocks. See the man page. Is this is the excerpt from the man page you are referring to? A read from the /dev/urandom device will not block waiting for more entropy. As a result, if there

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-07 Thread Kyle Hamilton
David S: to my knowledge you're at least somewhat incorrect, and part of your advice is rather dangerous to rely upon (from a cryptographic theory perspective). /dev/urandom will never, under normal circumstances, block -- its output is generated algorithmically by the random/urandom device

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-07 Thread David Schwartz
Kyle Hamilton wrote: David S: to my knowledge you're at least somewhat incorrect, and part of your advice is rather dangerous to rely upon (from a cryptographic theory perspective). You are at least somewhat incorrect too. And yes, it is possible to run out the entropy pool. The amount

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-07 Thread Theodore Tso
On Thu, Aug 07, 2008 at 02:13:27AM -0700, David Schwartz wrote: If so, this doesn't say that /dev/urandom never blocks. It just says that it will not block waiting for more entropy. In fact, this paragraph is horribly misleading, because it suggests that the worst thing /dev/urandom can do is

Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
Hi, I and a few other users are seeing sshd failing with Couldn't obtain random bytes (error 604389476) and other ssl-related application failing randomly in user mode linux guests and I suspect a problem in openssl that got triggered by some change in UML. I reviewed the RAND_poll function

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
Stanislav Meduna wrote: - add r = -1; inside the do loop after the int try_read = 0; Erm, actually I mean r = -1; errno = EAGAIN; or something like that - it has to let the while know that the poll timed out. -- Stano

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Tomas Mraz
On Wed, 2008-08-06 at 11:08 +0200, Stanislav Meduna wrote: Hi, I and a few other users are seeing sshd failing with Couldn't obtain random bytes (error 604389476) and other ssl-related application failing randomly in user mode linux guests and I suspect a problem in openssl that got

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
Tomas Mraz wrote: errno has garbage value - this should be fixed by initializing errno to 0 before the poll/select calls. Actually after it returns with timeout - a successfull syscall is free to set errno to whatever value it wants, it is only after an error the value has to be meaningful (I

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread David Schwartz
Tried many many times, even two running at the same time or poll timeout set to zero, not one instance of blocking even with od -x /dev/urandom and od -x /dev/random running simultaneously (the second one blocks, of course). H.. what the #$%# is happening here.. more ideas?

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
David Schwartz wrote: Try launching your test program automatically on boot up at the saem time you launch ssh or whatever application is failing. I bet '/dev/urandom' will fail then. The program had no problems running with simultaneous od -x /dev/random, that was blocking because it sucked

RE: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread David Schwartz
David Schwartz wrote: Try launching your test program automatically on boot up at the saem time you launch ssh or whatever application is failing. I bet '/dev/urandom' will fail then. The program had no problems running with simultaneous od -x /dev/random, that was blocking because