The newly announced FreSSH, when there is no /dev/urandom available,
uses a `fallback' to seed its PRNG that consists of:
int numfs, whichfs = 0;
struct statfs *mntbuf;
numfs = getmntinfo(&mntbuf, MNT_NOWAIT);
while (whichfs < numfs) {
ssh_rand_feed((void *) mntbuf,
sizeof(struct statfs));
memset(mntbuf, 0, sizeof(struct statfs));
mntbuf++;
whichfs++;
}
I don't think I need to tell people on this list why that's absolutely
horrible; I'm just pointing out that code is still released today with
crap like this. I would have thought we'd learned this lesson years
ago with the AFS, krb4, Netscape, et al vulnerabilities.
- Re: Bad PRNGs revisted in FreSSH Charles M. Hannum
- Re: Bad PRNGs revisted in FreSSH tls
- OS snobbery... (was Re: Bad PRNGs revisted in... Valdis Kletnieks
- Re: OS snobbery... (was Re: Bad PRNGs rev... Thor Lancelot Simon
- Re: OS snobbery... (was Re: Bad PRNGs... Lars Hecking
- Re: Bad PRNGs revisted in FreSSH Joe Laffey
- Re: Bad PRNGs revisted in FreSSH Damien Miller
- Re: Bad PRNGs revisted in FreSSH Andrew Brown
- Re: Bad PRNGs revisted in FreSSH Ulf Moeller
- Re: Bad PRNGs revisted in FreSSH Thor Lancelot Simon
