On Tuesday 09 November 2010 20:59:44 Matthew Toseland wrote:
> On master, we use the hard RNG (Yarrow) to generate padding for data packets, 
> but not for auth packets, which use fastWeakRandom. With anon-auth we often 
> don't have a PeerNode object on which to put a per-peer RNG...
> 
> On zidel/packetFormat (the new packet format branch), for a while 
> fastWeakRandom was used to generate padding for packets; now it's a per-peer 
> weak RNG. On that branch, the crypto is dependant on the IV, not on the 
> packet hash, so arguably the strength of the padding is less important, but 
> it's still probably a bad idea to pad with predictable data?
> 
> What should we do in all these cases? We need a consistent and thought-out 
> policy. Security is more important than performance, and the performance 
> impact is relatively small even if we use Yarrow.
> 
Doh. We are in fact using the fastWeakRandom (and now the per-peer random) for 
padding - we use the hard random for the junk bytes, which are not necessary in 
new packet format.

That does leave the other cases though.

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Devl mailing list
[email protected]
http://freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to