On Wednesday 07 May 2014 15:12:53 James wrote:

> So please continue the "protage" thread discussion, but also a wider thread
> concerning other source downloads. Afterall, *if" you can inject* into
> sources, which are then compiled, who checks under the under_garments? 

Ha!  You need to go a few clicks back, or should I say under?  What if the 
hash algo itself is borked and collisions are becoming accepted?  What if the 
RNG you use on your PC is either backdoored by Intel (if hardware generated), 
or it has such a low entropy that it is trivial to crack its algorithmic 
derivatives.

I was quite surprised to see that the random pool available on a laptop I was 
working on at the time, was exceedingly lower than the 4096 max entropy.

Try this to see yours:  cat /proc/sys/kernel/random/entropy_avail

I now run sys-apps/haveged in the background, at least when I am generating 
ssl/gpg/ssh keys.


> [1]
> http://arstechnica.com/information-technology/2014/04/openssl-code-beyond-r
> epair-claims-creator-of-libressl-fork/

Useful to know someone is cleansing the code.  Thanks for sharing!

-- 
Regards,
Mick

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to