On Tuesday 09 November 2010 20:59:44 Matthew Toseland wrote:
> On master, we use the hard RNG (Yarrow) to generate padding for data packets, 
> but not for auth packets, which use fastWeakRandom. With anon-auth we often 
> don't have a PeerNode object on which to put a per-peer RNG...
> 
> On zidel/packetFormat (the new packet format branch), for a while 
> fastWeakRandom was used to generate padding for packets; now it's a per-peer 
> weak RNG. On that branch, the crypto is dependant on the IV, not on the 
> packet hash, so arguably the strength of the padding is less important, but 
> it's still probably a bad idea to pad with predictable data?
> 
> What should we do in all these cases? We need a consistent and thought-out 
> policy. Security is more important than performance, and the performance 
> impact is relatively small even if we use Yarrow.
> 
Doh. We are in fact using the fastWeakRandom (and now the per-peer random) for 
padding - we use the hard random for the junk bytes, which are not necessary in 
new packet format.

That does leave the other cases though.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20101109/2486eb83/attachment.pgp>

Reply via email to