Re: [cryptography] LeastAuthority.com announces PRISM-proof storage service

2013-08-16 Thread Werner Koch
On Thu, 15 Aug 2013 13:11, wasabe...@gmail.com said: > To: and From: headers leak the emails/identity of communicating parties, > but it's not the only place that happens. I've never used PGP but I've used OpenPGP allows sending messages without information on the used keys (e.g. gpg --throw-keyid

[cryptography] urandom vs random

2013-08-16 Thread shawn wilson
I thought that decent crypto programs (openssh, openssl, tls suites) should read from random so they stay secure and don't start generating /insecure/ data when entropy runs low. The only way I could see this as being a smart thing to do is if these programs also looked at how much entropy the kern

Re: [cryptography] urandom vs random

2013-08-16 Thread Swair Mehta
I think the programs block when reading from random, if the kernel doesnt have enough entropy. When reading from urandom, that is not the case. Basically the internal pool is reused to generate pseudo random bits so that the call doesnt need to block. As far as I know, there is no measure like 50

Re: [cryptography] urandom vs random

2013-08-16 Thread shawn wilson
On Fri, Aug 16, 2013 at 10:03 AM, Swair Mehta wrote: > As far as I know, there is no measure like 50 or so for /dev/random. > /proc/sys/kernel/random/entropy_avail ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mail

Re: [cryptography] urandom vs random

2013-08-16 Thread Eitan Adler
On Fri, Aug 16, 2013 at 3:32 PM, shawn wilson wrote: > I thought that decent crypto programs (openssh, openssl, tls suites) > should read from random so they stay secure and don't start generating > /insecure/ data when entropy runs low. Depends on the operating system. > The only way I could se

Re: [cryptography] urandom vs random

2013-08-16 Thread Aaron Toponce
iVBORw0KGgoNSUhEUgAAAFwAAABcAQMAAADZIUAbBlBMVEX///8A AABVwtN+S0lEQVQ4jbXSUQoAIAhEwYXuf2NhS1O6QM+EnH4qUfoaK2bBcJysnUUVWY lGput3JGxPD1H00byAQ17r20YW8QaChXr2UHgiUHyNDSRgxkgDsThDAElFTkSuQmCC Crypto-Hint: image/png On Fri, Aug 16, 2013 at 09:32:02AM -0400, shawn wilson wrote: > I though

[cryptography] Expired/Revoked certificates + private keys

2013-08-16 Thread Dominik Schürmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 For a research project on OCSP, we are searching for expired and revoked X.509 certificates with their corresponding private keys. Any help or pointers to find leaked keys are much appreciated. Regards Dominik Schürmann -BEGIN PGP SIGNATURE- V

Re: [cryptography] Expired/Revoked certificates + private keys

2013-08-16 Thread Jeffrey Walton
On Fri, Aug 16, 2013 at 11:03 AM, Dominik Schürmann wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > For a research project on OCSP, we are searching for expired and > revoked X.509 certificates with their corresponding private keys. Any > help or pointers to find leaked keys are much

Re: [cryptography] urandom vs random

2013-08-16 Thread Tony Arcieri
On Fri, Aug 16, 2013 at 6:32 AM, shawn wilson wrote: > I thought that decent crypto programs (openssh, openssl, tls suites) > should read from random so they stay secure and don't start generating > /insecure/ data when entropy runs low. This presumes that urandom is somehow more "insecure", wh

Re: [cryptography] urandom vs random

2013-08-16 Thread Patrick Mylund Nielsen
On Fri, Aug 16, 2013 at 11:42 AM, Tony Arcieri wrote: > On Fri, Aug 16, 2013 at 6:32 AM, shawn wilson wrote: > >> I thought that decent crypto programs (openssh, openssl, tls suites) >> should read from random so they stay secure and don't start generating >> /insecure/ data when entropy runs lo

Re: [cryptography] urandom vs random

2013-08-16 Thread Tony Arcieri
On Fri, Aug 16, 2013 at 8:47 AM, Patrick Mylund Nielsen < cryptogra...@patrickmylund.com> wrote: > Not for nothing, but that refers to both random and urandom, showing one > problem with the entropy estimation, and another with the pool mixing > function. > "Finally, we propose a simple and very

Re: [cryptography] urandom vs random

2013-08-16 Thread Patrick Mylund Nielsen
On Fri, Aug 16, 2013 at 12:03 PM, Tony Arcieri wrote: > On Fri, Aug 16, 2013 at 8:47 AM, Patrick Mylund Nielsen < > cryptogra...@patrickmylund.com> wrote: > >> Not for nothing, but that refers to both random and urandom, showing one >> problem with the entropy estimation, and another with the poo

Re: [cryptography] LeastAuthority.com announces PRISM-proof storage service

2013-08-16 Thread zooko
On Tue, Aug 13, 2013 at 03:16:33PM -0500, Nico Williams wrote: > > Nothing really gets anyone past the enormous supply of zero-day vulns in > their complete stacks. In the end I assume there's no technological PRISM > workarounds. I agree that compromise of the client is relevant. My current b

Re: [cryptography] LeastAuthority.com announces PRISM-proof storage service

2013-08-16 Thread zooko
On Tue, Aug 13, 2013 at 01:52:38PM -0500, Nicolai wrote: > > Zooko: Congrats on the service. I'm wondering if you could mention on the > site which primitives are used client-side. All I see is that combinations > of sftp and ssl are used for data-in-flight. Thanks! I'm not sure what your qu

Re: [cryptography] urandom vs random

2013-08-16 Thread Tony Arcieri
On Fri, Aug 16, 2013 at 9:18 AM, Patrick Mylund Nielsen < cryptogra...@patrickmylund.com> wrote: > Yes, but they aren't talking about urandom. Your reply made it sound like > random is weak, but the paper points to both (as urandom is seeded by > random), and they propose a new AES-based PRNG that

Re: [cryptography] LeastAuthority.com announces PRISM-proof storage service

2013-08-16 Thread Nico Williams
On Fri, Aug 16, 2013 at 2:11 PM, zooko wrote: > On Tue, Aug 13, 2013 at 03:16:33PM -0500, Nico Williams wrote: >> >> Nothing really gets anyone past the enormous supply of zero-day vulns in >> their complete stacks. In the end I assume there's no technological PRISM >> workarounds. > > I agree

Re: [cryptography] urandom vs random

2013-08-16 Thread Patrick Mylund Nielsen
On Fri, Aug 16, 2013 at 3:30 PM, Tony Arcieri wrote: > On Fri, Aug 16, 2013 at 9:18 AM, Patrick Mylund Nielsen < > cryptogra...@patrickmylund.com> wrote: > >> Yes, but they aren't talking about urandom. Your reply made it sound like >> random is weak, but the paper points to both (as urandom is s

Re: [cryptography] urandom vs random

2013-08-16 Thread Tony Arcieri
On Fri, Aug 16, 2013 at 12:49 PM, Patrick Mylund Nielsen < cryptogra...@patrickmylund.com> wrote: > You replied with a link to a paper that states that both /dev/random and > /dev/urandom have the same weaknesses, and said that "/dev/random isn't > robust." > I was quoting the title of the paper

Re: [cryptography] urandom vs random

2013-08-16 Thread Tony Arcieri
On Fri, Aug 16, 2013 at 12:55 PM, Tony Arcieri wrote: > I was quoting the title of the paper in the context of a thread in which > someone claimed that /dev/random should be used in lieu of /dev/random. > That's all I was pointing out. > Blah, /dev/urandom... -- Tony Arcieri __

[cryptography] open letter to Phil Zimmermann and Jon Callas of Silent Circle, re: Silent Mail shutdown

2013-08-16 Thread Zooko Wilcox-OHearn
also posted here: https://leastauthority.com/blog/open_letter_silent_circle.html This open letter is in response to the `recent shutdown of Lavabit`_ , the ensuing `shutdown of Silent Circle's “Silent Mail” product`_, `Jon Callas's posts about the topic on G+`_, and `Phil Zimmermann's interview i

Re: [cryptography] urandom vs random

2013-08-16 Thread D. J. Bernstein
Aaron Toponce writes: > Cryptographers don't like the idea that it's possible, even if it's > excessively remote, and highly unprobable. This is why you see suggestions > to use /dev/random for long term SSH, SSL and OpenPGP keys. Cryptographers are certainly not responsible for this superstitious

Re: [cryptography] urandom vs random

2013-08-16 Thread Nico Williams
On Fri, Aug 16, 2013 at 7:24 PM, D. J. Bernstein wrote: > I'm not saying that /dev/urandom has a perfect API. [...] It might be useful to think of what a good API would be. I've thought before that the Unix everything-as-a-file philosophy makes for lame entropy APIs, and yet it's what we have t

Re: [cryptography] urandom vs random

2013-08-16 Thread James A. Donald
At startup, likely to be short of entropy. Actual behavior, and even existence, of /dev/random and /dev/urandom varies substantially from one implementation to another. If /dev/random blocks when short of entropy, then likely to block at startup, which is good. Services that need entropy do

Re: [cryptography] urandom vs random

2013-08-16 Thread shawn wilson
On Fri, Aug 16, 2013 at 10:01 PM, James A. Donald wrote: > At startup, likely to be short of entropy. > > If /dev/urandom seeded at startup, and then seeded no further, bad, but not > very bad. > > If /dev/urandom seeded at startup from /dev/random, then should block at > startup. > > If /dev/ura

Re: [cryptography] urandom vs random

2013-08-16 Thread James A. Donald
On Fri, Aug 16, 2013 at 10:01 PM, James A. Donald wrote: If /dev/urandom seeded at startup, and then seeded no further, bad, but not very bad. If /dev/urandom seeded at startup from /dev/random, then should block at startup. If /dev/urandom never blocks, bad. Should block at startup waiting t

Re: [cryptography] urandom vs random

2013-08-16 Thread Thor Lancelot Simon
On Fri, Aug 16, 2013 at 10:33:11PM -0400, shawn wilson wrote: > On Fri, Aug 16, 2013 at 10:01 PM, James A. Donald wrote: > > At startup, likely to be short of entropy. > > > > > If /dev/urandom seeded at startup, and then seeded no further, bad, but not > > very bad. > > > > If /dev/urandom seede

[cryptography] Reply to Zooko (in Markdown)

2013-08-16 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Also at http://silentcircle.wordpress.com/2013/08/17/reply-to-zooko/ # Reply to Zooko (My friend and colleague, [Zooko Wilcox-O'Hearn](https://leastauthority.com/blog/author/zooko-wilcox-ohearn.html) wrote an open letter to me and Phil [on his blo