Re: Looking through a modulo operation

2008-07-22 Thread David Wagner
Matt Ball writes: >Another attacking avenue is the 32-bit initial seed. If the >implementation re-seeds frequently, or leaks to you the first outputs >after initialization, then you only have to brute-force the 32-bit >seed space, times the number of samples since reseeding. Well, that's good and

Re: Looking through a modulo operation

2008-07-22 Thread Matt Ball
On Mon, Jul 21, 2008 at 8:33 AM, Matt Ball <[EMAIL PROTECTED]> wrote: > >"If someone uses the __random32 function as defined in the 2.6.26 > Linux kernel, and leaks to you the result of taking successive outputs > modulo 28233 (= 9 * 3137), can you determine the probable 96-bit > internal state

how to check if your ISP's DNS servers are safe

2008-07-22 Thread Perry E. Metzger
Niels Provos has a web page up with some javascript that automatically checks if your DNS caching server has been properly patched or not. http://www.provos.org/index.php?/pages/dnstest.html It is worth telling people to try. -- Perry E. Metzger[EMAIL PROTECTED] --

Re: Kaminsky finds DNS exploit

2008-07-22 Thread Perry E. Metzger
Udhay Shankar N <[EMAIL PROTECTED]> writes: > Kaminsky Breaks DNS [...] > Unlike other researchers who give up the gory details, Kaminsky took a > wiser path by smiling and nodding. He’ll give up the goods at Black > Hat in August. That should give folks enough time to patch their > systems. The