Re: seeding /dev/random from a security key

2024-03-26 Thread Jeffrey Walton
On Tue, Mar 26, 2024 at 7:12 PM Björn Persson  wrote:
>
> Jeffrey Walton wrote:
> > For what you want to do, and if I am parsing it correctly... I would
> > write a daemon in C [...]
>
> Only in the unlikely case that both RNGD and SCDrand turn out unsuitable
> somehow. Writing and compiling a daemon is no less work than compiling
> an already written daemon.
>
> > The part about extracting the entropy from the source would use
> > OpenSSL or GnuPG. I believe you would compile and link to OpenSSL's
> > libcrypto.{a|so}, or GnuPG's libgcrypt.{a|so}.
>
> RNGD 6 actually uses OpenSC's libp11, where it calls the function
> PKCS11_generate_random, which in turn calls the PKCS #11 function
> C_GenerateRandom.

It sounds like you have it sorted out. Good luck with it.

Jeff



Re: seeding /dev/random from a security key

2024-03-26 Thread Björn Persson
Jeffrey Walton wrote:
> For what you want to do, and if I am parsing it correctly... I would
> write a daemon in C [...]

Only in the unlikely case that both RNGD and SCDrand turn out unsuitable
somehow. Writing and compiling a daemon is no less work than compiling
an already written daemon.

> The part about extracting the entropy from the source would use
> OpenSSL or GnuPG. I believe you would compile and link to OpenSSL's
> libcrypto.{a|so}, or GnuPG's libgcrypt.{a|so}.

RNGD 6 actually uses OpenSC's libp11, where it calls the function
PKCS11_generate_random, which in turn calls the PKCS #11 function
C_GenerateRandom.

Björn Persson


pgpOK5m0QGWIe.pgp
Description: OpenPGP digital signatur


Re: seeding /dev/random from a security key

2024-03-26 Thread Jeffrey Walton
On Tue, Mar 26, 2024 at 11:52 AM Björn Persson  wrote:
>
> Jeffrey Walton wrote:
> > Out of morbid curiosity, what hardware are the servers using? RDRAND
> > and RDSEED have been available since about 2012, so it is mostly
> > ubiquitous nowadays.
>
> Do you mean I should add to the e-waste pile by throwing away working
> hardware and buy an entire new computer instead of buying a tiny dongle?

No, I was wondering about the server hardware. I would be surprised to
learn of something without Intel's SecureKey nowadays (assuming it is
x86{-64} based).

> > Be careful of rng-tools. It does not do a good job for non-mainstream
> > generators, like VIA's Padlock Security Engine. And rng-tools did not
> > support generators for architectures, like you would find on ARM,
> > aarch64 and PowerPC.
>
> I figure it can be used with devices it supports even if there are some
> other devices it doesn't support – but it looks like I'd have to build
> it from source myself.

Yeah, I've had to do that in the past. You will also (probably) need
to write a systemd unit file or two.

> > OpenSSL and GnuPG should be
> > able to extract the entropy from the card, and then use it to seed
> > /dev/{u}random.
>
> This job requires a daemon. OpenSSL is a library. Or do you mean its
> command-line tool? So how would I tell that to fetch random data
> through PKCS #11?
>
> GnuPG at least has a daemon called scdaemon. Is that what you mean? So
> how would I tell that to fetch random data through PKCS #11 and write
> to /dev/random?

For what you want to do, and if I am parsing it correctly... I would
write a daemon in C to collect the entropy from the source, then
extract the entropy from the bytes, and then insert the entropy into
the system's random number generator. For entropy extraction, take a
look at HKDF and Krawczyk's paper. Krawczyk does a good job of cleanly
separating entropy extraction from later stage key expansion.

The part about extracting the entropy from the source would use
OpenSSL or GnuPG. I believe you would compile and link to OpenSSL's
libcrypto.{a|so}, or GnuPG's libgcrypt.{a|so}. Since this is a daemon
and not a driver, I believe you can use the shared objects.

I eat my own dog food. I've done similar in the past with both an
EntropyKey and custom on-board generator for a MIPS Creator CI-20 with
the jz4780-rng. For the EntropyKey, I did not even bother decrypting
the stream. I stuffed the encrypted stream right into /dev/random,
because the amount of entropy does not change regardless of the
formatting (encrypted vs unencrypted).

And you may find this interesting... Debian suffers entropy depletion
on /dev/random and can hang components that use it, including
/dev/urandom. It is easy for a userland process to do. All you need is
a stock Debian system _without_ an entropy gatherer like Haveged. Have
your program perform a big read on /dev/random with O_NONBLOCK. The
kernel will return every last bit of entropy it has, and then start
blocking processes. The only way to recover in reasonable time is to
run a daemon like Haveged. I reported it to the devs several years
ago, but there was no interest in fixing it.

Jeff



Re: seeding /dev/random from a security key

2024-03-26 Thread Björn Persson
Jeffrey Walton wrote:
> Out of morbid curiosity, what hardware are the servers using? RDRAND
> and RDSEED have been available since about 2012, so it is mostly
> ubiquitous nowadays.

Do you mean I should add to the e-waste pile by throwing away working
hardware and buy an entire new computer instead of buying a tiny dongle?

> Be careful of rng-tools. It does not do a good job for non-mainstream
> generators, like VIA's Padlock Security Engine. And rng-tools did not
> support generators for architectures, like you would find on ARM,
> aarch64 and PowerPC.

I figure it can be used with devices it supports even if there are some
other devices it doesn't support – but it looks like I'd have to build
it from source myself.

> OpenSSL and GnuPG should be
> able to extract the entropy from the card, and then use it to seed
> /dev/{u}random.

This job requires a daemon. OpenSSL is a library. Or do you mean its
command-line tool? So how would I tell that to fetch random data
through PKCS #11?

GnuPG at least has a daemon called scdaemon. Is that what you mean? So
how would I tell that to fetch random data through PKCS #11 and write
to /dev/random?

Björn Persson


pgpia22PvZ5bD.pgp
Description: OpenPGP digital signatur


Re: seeding /dev/random from a security key

2024-03-25 Thread Jeffrey Walton
On Mon, Mar 25, 2024 at 4:33 PM Björn Persson  wrote:
>
> In a quest to acquire hardware random number generators for seeding
> /dev/random on servers that lack a built-in entropy source, I'm
> investigating how random data can be obtained from a security key such
> as a Nitrokey, Yubikey or a similar device.

Out of morbid curiosity, what hardware are the servers using? RDRAND
and RDSEED have been available since about 2012, so it is mostly
ubiquitous nowadays.

> RNGD version 6 from https://github.com/nhorman/rng-tools can fetch
> random data through a PKCS #11 interface, but the two versions of RNGD
> in Debian seem to lack that ability. Debian has rng-tools5 and
> rng-tools-debian, but not Neil Horman's version 6. Or am I just failing
> to find it?

Be careful of rng-tools. It does not do a good job for non-mainstream
generators, like VIA's Padlock Security Engine. And rng-tools did not
support generators for architectures, like you would find on ARM,
aarch64 and PowerPC.

> SCDrand from https://incenp.org/dvlpt/scdtools.html can also obtain
> random data from a "smartcard"-compatible device, but I don't find that
> in Debian either.
>
> Does anyone know of another way to obtain random data from devices of
> this kind?

PKCS#11 is a standard interface. If the card provides a generator,
then the code is the same for all cards. OpenSSL and GnuPG should be
able to extract the entropy from the card, and then use it to seed
/dev/{u}random.

But keep in mind ... the kernel crypto folks effectively deprecated
/dev/random, and recommend using /dev/urandom for your random bits. Or
use getrandom(2). See <https://lkml.org/lkml/2017/7/20/993>.

Jeff



Re: seeding /dev/random from a security key

2024-03-25 Thread Björn Persson
Andy Smith wrote:
> EntropyKey is a dead product that can no longer be obtained

I've seen several like that. They're permanently sold out, or the
webshops are abandoned and half-broken. Pure random number generators
that are actually possible to buy are rare. That's why I'm
investigating whether security keys can be used instead. Security keys
are available from multiple vendors, but it's hard to find any
information about the random number generators inside them.

> OneRNG is still in production.

I tried to buy one of those a while ago, but I couldn't because the
shop didn't like my card number.

> On their mailing list however, there
> is a recent discussion about whether there any point. The conclusion
> seems to be "not really". Thread starts here:
> 
> http://lists.ourshack.com/pipermail/discuss/2024-March/000797.html
> 
> The thread covers how to make rngd feed /dev/random from a OneRNG in
> Debian 12, but it is no longer possible to tell if that does
> anything useful.

It is indeed harder to tell since Linux stopped keeping track of the
entropy level, and it's now necessary to force-feed /dev/random
periodically instead of waiting for the entropy level to drop.

A random number generator is still useful on a server with no keyboard,
no spinning disk and no RDRAND or similar processor instruction.
Otherwise network traffic becomes the only source of entropy, and I'd
rather not rely solely on events controlled by other computers.

It also helps to mix entropy from multiple sources, in case one of them
has a design flaw or a backdoor, or breaks down, or loses its driver
like in Debian bug 1041007.

Björn Persson


pgpEuWy2nx_ME.pgp
Description: OpenPGP digital signatur


Re: seeding /dev/random from a security key

2024-03-25 Thread Greg Wooledge
On Mon, Mar 25, 2024 at 06:09:02PM -0400, e...@gmx.us wrote:
> On 3/25/24 17:27, Andy Smith wrote:
> > The thread covers how to make rngd feed /dev/random from a OneRNG in
> > Debian 12, but it is no longer possible to tell if that does
> > anything useful.
> 
> If not from devices like this, from where does Debian get its randomness?

random(4) (i.e. "man 4 random") gives a basic introduction to the topic,
if you have manpages-dev installed.



Re: seeding /dev/random from a security key

2024-03-25 Thread eben

On 3/25/24 17:27, Andy Smith wrote:

The thread covers how to make rngd feed /dev/random from a OneRNG in
Debian 12, but it is no longer possible to tell if that does
anything useful.


If not from devices like this, from where does Debian get its randomness?

--
For is it not written, wheresoever two or three are gathered
together, yea they will perform the Parrot Sketch.

-- Rob on ASR



Re: seeding /dev/random from a security key

2024-03-25 Thread Andy Smith
Hi,

On Mon, Mar 25, 2024 at 09:24:23PM +0100, Björn Persson wrote:
> Does anyone know of another way to obtain random data from devices of
> this kind?

I have some EntropyKeys and some OneRNGs. I have the rngd packaged
in Debian feeding /dev/random from them.

This had an actual noticeable effect in Debian 9 and earlier, but
since the reworking of Linux's random subsystem I cannot demonstrate
any benefit unless I disable all use of the RDRAND CPU instruction.

EntropyKey is a dead product that can no longer be obtained but
OneRNG is still in production. On their mailing list however, there
is a recent discussion about whether there any point. The conclusion
seems to be "not really". Thread starts here:

http://lists.ourshack.com/pipermail/discuss/2024-March/000797.html

The thread covers how to make rngd feed /dev/random from a OneRNG in
Debian 12, but it is no longer possible to tell if that does
anything useful.

I most likely will not be replacing these devices when they fail.

Thanks,
Andy

-- 
https://bitfolk.com/ -- No-nonsense VPS hosting



seeding /dev/random from a security key

2024-03-25 Thread Björn Persson
Hello!

In a quest to acquire hardware random number generators for seeding
/dev/random on servers that lack a built-in entropy source, I'm
investigating how random data can be obtained from a security key such
as a Nitrokey, Yubikey or a similar device.

RNGD version 6 from https://github.com/nhorman/rng-tools can fetch
random data through a PKCS #11 interface, but the two versions of RNGD
in Debian seem to lack that ability. Debian has rng-tools5 and
rng-tools-debian, but not Neil Horman's version 6. Or am I just failing
to find it?

SCDrand from https://incenp.org/dvlpt/scdtools.html can also obtain
random data from a "smartcard"-compatible device, but I don't find that
in Debian either.

Does anyone know of another way to obtain random data from devices of
this kind?

Björn Persson


pgp1OCs1ezY_B.pgp
Description: OpenPGP digital signatur


Re: /dev/random

2014-08-04 Thread Joel Rees
On Sat, Aug 2, 2014 at 11:01 AM, Joel Rees joel.r...@gmail.com wrote:
 [...]

 Now, the random typing is not necessary.

Well, it's not as rosy as I thought, for /dev/random:


duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=16
if=/dev/random iflag=fullblock of=randump2
16+0 レコード入力
16+0 レコード出力
2048 バイト (2.0 kB) コピーされました、 107.939 秒、 0.0 kB/秒

real1m47.945s
user0m0.004s
sys0m0.012s
duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=16
if=/dev/urandom iflag=fullblock of=urandump2
16+0 レコード入力
16+0 レコード出力
2048 バイト (2.0 kB) コピーされました、 0.000850541 秒、 2.4 MB/秒

real0m0.048s
user0m0.004s
sys0m0.004s


I want to take a 2 MB dump from both and run some statistical stuff on
them. Which means I'm going to have to start the one for urandom in
the morning one day when I'm going to be doing something else with a
lot of typing and other entropy improving stuff and see how long it
takes to dump 16 kilobytes, and then try 64 kilobytes, and so forth
until I have an idea how long it will take.

-- 
Joel Rees

Be careful where you see conspiracy.
Look first in your own heart.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAAr43iNEWXiUNByAgZ1=qM3YD+qc0F9PXPvc=qbhg2ildqd...@mail.gmail.com



Re: /dev/random

2014-08-04 Thread Joel Rees
On Mon, Aug 4, 2014 at 7:52 PM, Joel Rees joel.r...@gmail.com wrote:
 On Sat, Aug 2, 2014 at 11:01 AM, Joel Rees joel.r...@gmail.com wrote:
 [...]

 Now, the random typing is not necessary.

 Well, it's not as rosy as I thought, for /dev/random:

 
 duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=16
 if=/dev/random iflag=fullblock of=randump2
 16+0 レコード入力
 16+0 レコード出力
 2048 バイト (2.0 kB) コピーされました、 107.939 秒、 0.0 kB/秒

 real1m47.945s
 user0m0.004s
 sys0m0.012s
 duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=16
 if=/dev/urandom iflag=fullblock of=urandump2
 16+0 レコード入力
 16+0 レコード出力
 2048 バイト (2.0 kB) コピーされました、 0.000850541 秒、 2.4 MB/秒

 real0m0.048s
 user0m0.004s
 sys0m0.004s
 

 I want to take a 2 MB dump from both and run some statistical stuff on
 them. Which means I'm going to have to start the one for urandom in
 the morning one day when I'm going to be doing something else with a
 lot of typing and other entropy improving stuff and see how long it
 takes to dump 16 kilobytes, and then try 64 kilobytes, and so forth
 until I have an idea how long it will take.

--
duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=128
if=/dev/urandom iflag=fullblock of=urandump2
128+0 レコード入力
128+0 レコード出力
16384 バイト (16 kB) コピーされました、 0.00482425 秒、 3.4 MB/秒

real0m0.011s
user0m0.000s
sys0m0.004s
duty@deb:~/math_work/sf/rollcalld$ time dd bs=128 count=128
if=/dev/random iflag=fullblock of=randump2
128+0 レコード入力
128+0 レコード出力
16384 バイト (16 kB) コピーされました、 946.389 秒、 0.0 kB/秒

real15m46.570s
user0m0.008s
sys0m0.120s
--

Reading e-mail and posting to one of my blogs while I dumped /dev/random .

16 minutes for 16K, looks like 64K will be an hour and a half or so.

16K is enough for some initial analysis. Need to allocate some time for it.

-- 
Joel Rees

Be careful where you see conspiracy.
Look first in your own heart.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAAr43iNNJfKuumG5FG1ZNpFQA5=jpkj+svorrywtg3tpvod...@mail.gmail.com



Re: /dev/random

2014-08-03 Thread Steve Litt
On Fri, 1 Aug 2014 16:34:50 +0100
Lisi Reisz lisi.re...@gmail.com wrote:

 On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
  Thanks for reading
 
 I found it unreadable.  Please let some air in!!
 
 Lisi

LOL


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140803110221.4800d...@mydesq2.domain.cxm



Re: /dev/random

2014-08-03 Thread Steve Litt
On Fri, 1 Aug 2014 17:48:33 +0200
B lazyvi...@gmx.com wrote:

 On Fri, 1 Aug 2014 16:34:50 +0100
 Lisi Reisz lisi.re...@gmail.com wrote:
 
  On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
   Thanks for reading
  
  I found it unreadable.  Please let some air in!!
 
 This is a common deformation inducted by the web: people
 tend to reject what is more than 10 lines or without a
 very explicit title.
 Which is not very good for learning and comprehending things…
 
 Take your time and use a very old and well known cure
 as an every day mental hygiene: forget the web and use
 something made in paper called a book; you'll see, 
 it will open your horizons and your mind ;)

Yes, and start with The French Lieutenant's Woman. The entire first
page is one paragraph, ornate with bullshituous adverbs and other
fluffatudes. In the 1980's, long before what we call the web (http),
I bought this book at Crown books, read the first page, and threw it in
the garbage. Six bucks well spent: I learned how not to write.

Megaparagraphs were all the rage in the 1800's, when housewives had
nothing to do but keep house, businessmen had nothing to do but do
their business, and farmers had nothing to do but farm. Long days? Of
course. But when they were done, they were done, and could fully
concentrate.

Denizens of the 1800's weren't on call 24/7. They didn't need to work
on five issues at once. They didn't need to wedge urgent calls to the
bureaucracy while snarfing lunch and answering fifteen emails, keeping
one ear open for texts. Workers at the local saloon didn't need to take
orders from the radio in their right ear while taking money and giving
change to the customer speaking into their left.

If you want your writing to entertain folks from the 1800's, take a
time machine back, and write ornate megaparagraphs. But if you want to
be read by time-crunched citizens of the 21st century, make your point,
get onto the next thing, and make sure it's obvious you've moved on.

Or else, your writings generate the infamous tl;dnr.

SteveT

Steve Litt*  http://www.troubleshooters.com/
Troubleshooting Training  *  Human Performance


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140803111626.16324...@mydesq2.domain.cxm



Re: /dev/random

2014-08-03 Thread Steve Litt
On Fri, 1 Aug 2014 17:49:02 +0100
Lisi Reisz lisi.re...@gmail.com wrote:

 On Friday 01 August 2014 17:02:45 B wrote:
  But you didn't say it in your rant…
 
 I didn't rant.
 
 Lisi

It's twu, it's twu! Lisi wrote two short sentences that took up less
than one line. No rant. Her point was very succinct, complete with a
metaphor (let some air in). 

I'd like to go on, but the more I go on, the less succinct I get :-)

SteveT

Steve Litt*  http://www.troubleshooters.com/
Troubleshooting Training  *  Human Performance


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140803112023.6fdde...@mydesq2.domain.cxm



Re: /dev/random

2014-08-03 Thread Steve Litt
On Fri, 1 Aug 2014 12:15:22 -0700
Bob Holtzman hol...@cox.net wrote:

 On Fri, Aug 01, 2014 at 04:34:50PM +0100, Lisi Reisz wrote:
  On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
   Thanks for reading
  
  I found it unreadable.  Please let some air in!!
 
 Thank God. I thought I'd finally lost it.

Yeah, I read the first four lines (I think I break at 72 or something
like that), saw four times that much still to go, and went on to the
next post.

SteveT

Steve Litt*  http://www.troubleshooters.com/
Troubleshooting Training  *  Human Performance


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140803112128.1d728...@mydesq2.domain.cxm



Re: /dev/random

2014-08-01 Thread David Guyot
Le jeudi 31 juillet 2014 à 16:41:01 -0700, pecon...@mesanetworks.net a écrit:
 not generated by the functioning of the computer, but from something
 like the keystroke times of a human asking for help on this list. It
 differs from /dev/urandom in that /dev/random blocks and does not give
 any bits if there have not been enough keystrokes since the last call
 to replenish the supply of entropy in its entropy store. In contrast,
As far as I know, keystrokes aren't the only monitored data used to fill
the entropy pool; HDD and network I/Os timestamps are also use, as they
can be considered as chaotic. Maybe the kernel doc can help you to know
all of entropy sources. I know this isn't really the question, but I
think you must know that keystrokes aren't the only entropy sources.

Regards.
-- 
David Guyot
Administrateur système, réseau et télécommunications / Sysadmin
Europe Camions Interactive / Stockway
Moulin Collot
F-88500 Ambacourt
Tel: +33 (0)3 29 30 47 85
Fax : +33 (0)3 29 31 31 31


signature.asc
Description: Digital signature


Re: /dev/random

2014-08-01 Thread Andrei POPESCU
On Jo, 31 iul 14, 16:41:01, pecon...@mesanetworks.net wrote:
 
 Just how often do you have to poke at the keyboard? And
 when you do poke at it, about how many key presses do you make before
 you get the number of bits you requested? I'm wondering is this a
 event with which many Debianers are quite familiar, or is it more
 like something of a rare event that people know about, but most
 have never actually had it happen to them? Why do I ask?: Just wondering.

The only times I've seen this was when generating my GPG keys. Besides 
e-mail signing and ssh I only have an encrypted file with passwords.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic
http://nuvreauspam.ro/gpg-transition.txt


signature.asc
Description: Digital signature


Re: /dev/random

2014-08-01 Thread Joel Rees
On Fri, Aug 1, 2014 at 4:00 PM, David Guyot
david.gu...@europecamions-interactive.com wrote:
 Le jeudi 31 juillet 2014 à 16:41:01 -0700, pecon...@mesanetworks.net a écrit:
 not generated by the functioning of the computer, but from something
 like the keystroke times of a human asking for help on this list. It
 differs from /dev/urandom in that /dev/random blocks and does not give
 any bits if there have not been enough keystrokes since the last call
 to replenish the supply of entropy in its entropy store. In contrast,
 As far as I know, keystrokes aren't the only monitored data used to fill
 the entropy pool; HDD and network I/Os timestamps are also use, as they
 can be considered as chaotic. Maybe the kernel doc can help you to know
 all of entropy sources. I know this isn't really the question, but I
 think you must know that keystrokes aren't the only entropy sources.

Yes, but, ...

Most I/O devices are dependent on certain kinds of timing to function.
For instance, if you try to use the timing between cache fills on your
hard disk, and the system for some reason reads a large block of data
on a non-fragmented file, things that were pretty random suddenly are
not.

And there is a difference between random and arbitrary. If we could
access the bit jitter on the shift register behind the read heads, we
would discover quite of bit of regularity in the apparently random
rises and falls. Likewise, bearings are not perfectly smooth, and
lubricant not perfectly distributed, but the variations are going to
repeat themselves with some regularity.

Ethernet chatter seems unpredictable, but packets tend to flow in cyclic bursts.

Pretty much everything in our world has hidden cyclic behavior.
Keyboard hits tend to be much more random, but, even there, a good
typist gets a rhythm going as well.

-- 
Joel Rees

Be careful where you see conspiracy.
Look first in your own heart.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43ioszn6nndbl57prcj0pl5wkpahaj7pya_buvegkcpx...@mail.gmail.com



Re: /dev/random

2014-08-01 Thread Joel Rees
On Fri, Aug 1, 2014 at 8:41 AM,  pecon...@mesanetworks.net wrote:
 As many of you know, /dev/random is a source of random bits that are
 suitable for use

some uses

 in cryptographic analysis. [...]
 Just how often do you have to poke at the keyboard? And
 when you do poke at it, about how many key presses do you make before
 you get the number of bits you requested?

When generating certificates with openssl, I often have to type a full
paragraph or two to get the number of bits I need. I find myself
typing things I memorized in high school or seminary or words to
popular songs or advertisements. And if I get in too good a rhythm, I
end up having to type more.

So I stop and move the mouse pointer a bit, too, to break my rhythm
and to introduce another hand-type input.

The actual data can be tapped for entropy as well, but then you
introduce possible security issues. And using the entropy in data can
be pretty tricky, too. Otherwise, simple rotation cyphers would not be
subject to frequency analysis.

I'm wondering is this a
 event with which many Debianers are quite familiar, or is it more
 like something of a rare event that people know about, but most
 have never actually had it happen to them?

Considering the variety of debian users we have, some will not really
be conscious of the thing, some will be working with entropy issues
every day.

 Why do I ask?: Just wondering.

Heh.

 [...]

-- 
Joel Rees

Be careful where you see conspiracy.
Look first in your own heart.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43init6hz2m1kquv5dtexrv887si60jgg3h0mn7+b-hv...@mail.gmail.com



Re: /dev/random

2014-08-01 Thread David Guyot
Le vendredi 01 août 2014 à 20:36:29 +0900, Joel Rees a écrit:
 Yes, but, ...
 
 Most I/O devices are dependent on certain kinds of timing to function.
 For instance, if you try to use the timing between cache fills on your
 hard disk, and the system for some reason reads a large block of data
 on a non-fragmented file, things that were pretty random suddenly are
 not.
 
 And there is a difference between random and arbitrary. If we could
 access the bit jitter on the shift register behind the read heads, we
 would discover quite of bit of regularity in the apparently random
 rises and falls. Likewise, bearings are not perfectly smooth, and
 lubricant not perfectly distributed, but the variations are going to
 repeat themselves with some regularity.
 
 Ethernet chatter seems unpredictable, but packets tend to flow in cyclic 
 bursts.
 
 Pretty much everything in our world has hidden cyclic behavior.
 Keyboard hits tend to be much more random, but, even there, a good
 typist gets a rhythm going as well.
Indeed, the entropy pool isn't as chaotic as it seems, but, with a
deterministic machine like a computer, true random numbers can only be
retrieved by thermal noise in resistors or similar processes for which a
computer isn't designed. Besides, even if /dev/random is only pseudo-random,
guessing its output is hard enough to consider it as a true RNG for
common operations because, to guess /dev/random output, you would
have to know very precise machine parameters, as HDD lubricant
distribution, the kind of data you can only gather by deeply probing the
system, so deeply that using such a spied machine for RNG would be
futile.

In short, as partly chaotic is better than totally deterministic,
/dev/random can be considered reliable for punctual or day-to-day
activity, but it is also obvious that, if our activity needs truly
random number generation or heavy stream of at least pseudo random
numbers, a dedicated hardware using thermal noise, cosmic rays, nuclear
fission or any over per se chaotic phenomenon is greatly recommended.

Regards.
-- 
David Guyot
Administrateur système, réseau et télécommunications / Sysadmin
Europe Camions Interactive / Stockway
Moulin Collot
F-88500 Ambacourt
Tel: +33 (0)3 29 30 47 85
Fax : +33 (0)3 29 31 31 31


signature.asc
Description: Digital signature


Re: /dev/random

2014-08-01 Thread Lisi Reisz
On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
 Thanks for reading

I found it unreadable.  Please let some air in!!

Lisi


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201408011634.50327.lisi.re...@gmail.com



Re: /dev/random

2014-08-01 Thread Bzzzz
On Fri, 1 Aug 2014 16:34:50 +0100
Lisi Reisz lisi.re...@gmail.com wrote:

 On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
  Thanks for reading
 
 I found it unreadable.  Please let some air in!!

This is a common deformation inducted by the web: people
tend to reject what is more than 10 lines or without a
very explicit title.
Which is not very good for learning and comprehending things…

Take your time and use a very old and well known cure
as an every day mental hygiene: forget the web and use
something made in paper called a book; you'll see, 
it will open your horizons and your mind ;)

-- 
automobile if you were a car, you'd be a ferrari
mélanie o that's so cute darling, thanks
automobile your consumption is very high


signature.asc
Description: PGP signature


Re: /dev/random

2014-08-01 Thread Lisi Reisz
On Friday 01 August 2014 16:48:33 B wrote:
 Take your time and use a very old and well known cure
 as an every day mental hygiene: forget the web and use
 something made in paper called a book; you'll see,
 it will open your horizons and your mind ;)

I'm glad you live in a world where everyone has 20/20 vision and disability is 
unheard of.  Some of us are not so lucky.  It is 15 years since I was able to 
read a book.

Try to learn a little tolerance some time.

Lisi


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201408011653.09062.lisi.re...@gmail.com



Re: /dev/random

2014-08-01 Thread Bzzzz
On Fri, 1 Aug 2014 16:53:09 +0100
Lisi Reisz lisi.re...@gmail.com wrote:

 I'm glad you live in a world where everyone has 20/20 vision and
 disability is unheard of.  Some of us are not so lucky.  It is 15
 years since I was able to read a book.

But you didn't say it in your rant…
 
 Try to learn a little tolerance some time.

As some of my best friend are completely blind, I don't
think I'm that intolerant (you see ;-p)

-- 
* Cécilia was unblocked
Cécilia says : kikooo!!!
* Cécilia was blocked


signature.asc
Description: PGP signature


Re: /dev/random

2014-08-01 Thread Darac Marjal
On Fri, Aug 01, 2014 at 01:50:44AM +0200, B wrote:
 On Thu, 31 Jul 2014 16:41:01 -0700
  pecon...@mesanetworks.net wrote:
 
  whatever experience you want to share.
 
 use haveged, it feeds /dev/random with a reservoir.

I'd like to chime in that I recently installed haveged myself and have
seen a massive increase in available entropy.

Haveged, as I understand it basically runs a fairly complex calculation
(with lots of branches and things) in a loop. Because almost all CPUs
these days are complex beasts, the time to perform the calculation
varies with each loop (sometimes because of cache misses, or maybe a
branch was optimized differently). Haveged monitors the differences in
these times and populates a random pool based on it. This is then fed in
to the kernel as another source of entropy.

Haveged is amazingly useful on headless or virtual or appliance
machines.

 
 -- 
 Pazns: U don't know about the drawer method?
 Pazns: U take your schoolbag, empty it in a drawer, close it,
hop! clean up done!
 Zeeln: Yeah but my drawers are all full…
 Pazns: U don't know about the trash method?




signature.asc
Description: Digital signature


Re: /dev/random

2014-08-01 Thread Lisi Reisz
On Friday 01 August 2014 17:02:45 B wrote:
 But you didn't say it in your rant…

I didn't rant.

Lisi


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201408011749.02024.lisi.re...@gmail.com



Re: /dev/random

2014-08-01 Thread Bob Holtzman
On Fri, Aug 01, 2014 at 04:34:50PM +0100, Lisi Reisz wrote:
 On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
  Thanks for reading
 
 I found it unreadable.  Please let some air in!!

Thank God. I thought I'd finally lost it.

-- 
Bob Holtzman
Giant intergalactic brain-sucking hyperbacteria 
came to Earth to rape our women and create a race 
of mindless zombies.  Look!  It's working!


signature.asc
Description: Digital signature


Re: /dev/random

2014-08-01 Thread Andrei POPESCU
On Vi, 01 aug 14, 17:48:33, B wrote:
 On Fri, 1 Aug 2014 16:34:50 +0100
 Lisi Reisz lisi.re...@gmail.com wrote:
 
  On Friday 01 August 2014 00:41:01 pecon...@mesanetworks.net wrote:
   Thanks for reading
  
  I found it unreadable.  Please let some air in!!
 
 This is a common deformation inducted by the web: people
 tend to reject what is more than 10 lines or without a
 very explicit title.

I think it would have helped a lot if the whole thing was split in 
paragraphs ;)

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic
http://nuvreauspam.ro/gpg-transition.txt


signature.asc
Description: Digital signature


Re: /dev/random

2014-08-01 Thread Jerome BENOIT
Hi,

On 01/08/14 18:06, Darac Marjal wrote:
 On Fri, Aug 01, 2014 at 01:50:44AM +0200, B wrote:
 On Thu, 31 Jul 2014 16:41:01 -0700
  pecon...@mesanetworks.net wrote:

 whatever experience you want to share.

 use haveged, it feeds /dev/random with a reservoir.
 
 I'd like to chime in that I recently installed haveged myself and have
 seen a massive increase in available entropy.
 
 Haveged, as I understand it basically runs a fairly complex calculation
 (with lots of branches and things) in a loop. Because almost all CPUs
 these days are complex beasts, the time to perform the calculation
 varies with each loop (sometimes because of cache misses, or maybe a
 branch was optimized differently). Haveged monitors the differences in
 these times and populates a random pool based on it. This is then fed in
 to the kernel as another source of entropy.
 
 Haveged is amazingly useful on headless or virtual or appliance
 machines.

Unfortunately, it does not seem to work on OpenVZ boxes.

Jerome

 

 -- 
 Pazns: U don't know about the drawer method?
 Pazns: U take your schoolbag, empty it in a drawer, close it,
hop! clean up done!
 Zeeln: Yeah but my drawers are all full…
 Pazns: U don't know about the trash method?
 
 


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53dbf96f.9010...@rezozer.net



Re: /dev/random

2014-08-01 Thread Joel Rees
Okay, the following was old information. REALLY old information:

On Fri, Aug 1, 2014 at 8:51 PM, Joel Rees joel.r...@gmail.com wrote:
 On Fri, Aug 1, 2014 at 8:41 AM,  pecon...@mesanetworks.net wrote:
 As many of you know, /dev/random is a source of random bits that are
 suitable for use

 some uses

 in cryptographic analysis. [...]
 Just how often do you have to poke at the keyboard? And
 when you do poke at it, about how many key presses do you make before
 you get the number of bits you requested?

 When generating certificates with openssl, I often have to type a full

make that had, as in about ten years or so ago.

 paragraph or two to get the number of bits I need.
 [...]

The OS was probably Redhat or Fedora, and FreeBSD. Don't recall doing
it with Debian, so my information was not even relevant to Paul's
question. (Sorry, Paul.)

Just made a dummy key and cert on wheezy, after having been booted up
for about three hours. No typing or mouse movement was necessary, just
took a second or two. I suppose I should power cycle and see what it's
like with a fresh entropy pool.

-- 
Joel Rees

Be careful where you see conspiracy.
Look first in your own heart.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAAr43iNNmUsXC7Ve71d4ZcNnUbZT4BC9DSPgbz=-tpu326e...@mail.gmail.com



Re: /dev/random

2014-08-01 Thread Joel Rees
(For Lisi and Bob and others ;-/)

On Fri, Aug 1, 2014 at 8:41 AM,  pecon...@mesanetworks.net wrote:
 As many of you know, /dev/random is a source of random bits that are
 suitable for use in cryptographic analysis.

Wikipedia, stackoverflow, and other places have useful entries on
random numbers, randomness, and the problem of mechanically generating
random numbers when the machines we build are cyclic (repetitive) in
nature. pseudorandom and true random numbers are useful search
terms. Also,

man 3 rand

and following up on the references in the man page on debian presents
some useful background information.

Way oversimplifying, while a random number between 0 and 32,000 seems
a bit hard to guess to humans, a modern computer can count through the
possibilities in something like a millisecond.

And the random number algorithm for rand() generally uses a standard
formula (for compatibility reasons) such that, once you know one
random number it generates, you can predetermine the next with a
fairly simple calculation.

Random numbers are used in key places in our security systems, to help
thwart attackers. Obviously, the random numbers used there should not
be numbers returned from rand().

Various approaches have been taken to resolve the potential problems,
and the size of the random number and the predictability of the
calculation are always issues. 32 bits is still too quickly countable
to be comfortable, and any static formula is inherently reproduceable.

So we want some source of truly random numbers. The timing of events
that occur within the system tends to hide cyclic behavior and
synchronizations we don't expect. If the attacker can profile the
hardware of a system, he can guess the timings too often for such
things to be used alone.

 The software supporting
 /dev/random collects random time data from monitoring events that are
 not generated by the functioning of the computer, but from something
 like the keystroke times of a human asking for help on this list.

Typing on the keyboard and moving the mouse are two things that are
really out of sync with what's going on in the computer, especially at
sub-millisecond timings.

Floppy disks could be useful, with some care, but of course those are
not generally available any more. USB drives, with no moving parts
except electrons, are generally too regular to be of much use,
although a USB insertion would provide a bit or two of real world
randomness.

Entropy here is a mathematical term for referring to this kind of
real randomness, by the way. (Oversimplifications, again, but you
have to start somewhere.)

Mechanical hard disks and network devices also provide a bit of access
to de-synchronized events, and can also be used with care to provide
some of this entropy. (Emphasis on with care.)

The HAVEGE algorithm and the haveged daemon attempt to use CPU and
memory timings to provide more.

The CPU by itself is, even with out-of-order execution, too
predictable to be of use. But when you factor in cache hits and
misses, the unpredictable nature of what the CPU has been working on
before, in addition to variations between actual physical cache and
how that interplays with the actual CPU doing the work, etc., can give
useable entropy, according to the HAVEGE project description. Again,
you need to run the resulting timings through some pseudorandomness
massaging to make it actually useable.

The HAVEGE approach has been criticized, particularly if haveged is
allowed to replace all the other sources of entropy.

/dev/random and /dev/urandom are two devices which modern Unix-like
systems provide, which give programs (and users) access to the
randomness of external events like keypresses and mouse motion,
heavily massaged and filtered with pseudorandom techniques. (Without
the pseudorandomness, those devices would give the attacker new ways
to probe a computer.)

 It
 differs from /dev/urandom in that /dev/random blocks and does not give
 any bits if there have not been enough keystrokes since the last call
 to replenish the supply of entropy in its entropy store. In contrast,
 /dev/urandom gives the number of bits requested quickly, but with no
 guarantee as to the quality of their randomness.

I'm thinking I should wonder which openssl defaults to using.

Okay, the openssl site says /dev/urandom since way back, and
/dev/random only if /dev/urandom is not avaiable.

Hmm.

 Places where this
 distinction is discussed suggest that a user of /dev/random 'randomly'
 poke at the keys on his keyboard if he finds himself waiting for
 /dev/random to un-block and give the needed random bits. Some users of
 Debian are concerned about performing cryptographic analysis correctly
 and I wonder: Just how often do you have to poke at the keyboard? And
 when you do poke at it, about how many key presses do you make before
 you get the number of bits you requested? I'm wondering is this a
 event with which many Debianers are quite familiar, or is it more
 like

/dev/random

2014-07-31 Thread
As many of you know, /dev/random is a source of random bits that are
suitable for use in cryptographic analysis. The software supporting
/dev/random collects random time data from monitoring events that are
not generated by the functioning of the computer, but from something
like the keystroke times of a human asking for help on this list. It
differs from /dev/urandom in that /dev/random blocks and does not give
any bits if there have not been enough keystrokes since the last call
to replenish the supply of entropy in its entropy store. In contrast,
/dev/urandom gives the number of bits requested quickly, but with no
guarantee as to the quality of their randomness. Places where this
distinction is discussed suggest that a user of /dev/random 'randomly'
poke at the keys on his keyboard if he finds himself waiting for
/dev/random to un-block and give the needed random bits. Some users of
Debian are concerned about performing cryptographic analysis correctly
and I wonder: Just how often do you have to poke at the keyboard? And
when you do poke at it, about how many key presses do you make before
you get the number of bits you requested? I'm wondering is this a
event with which many Debianers are quite familiar, or is it more
like something of a rare event that people know about, but most
have never actually had it happen to them? Why do I ask?: Just wondering.

Thanks for reading, and please reply with 
whatever experience you want to share.

Best regards,

--
Paul E Condon   
pecon...@mesanetworks.net



-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140731164101.192b2...@m0005298.ppops.net



Re: /dev/random

2014-07-31 Thread Bzzzz
On Thu, 31 Jul 2014 16:41:01 -0700
 pecon...@mesanetworks.net wrote:

 whatever experience you want to share.

use haveged, it feeds /dev/random with a reservoir.

-- 
Pazns: U don't know about the drawer method?
Pazns: U take your schoolbag, empty it in a drawer, close it,
   hop! clean up done!
Zeeln: Yeah but my drawers are all full…
Pazns: U don't know about the trash method?


signature.asc
Description: PGP signature


Re: /dev/random

2014-07-31 Thread David Christensen

On 07/31/2014 04:41 PM, pecon...@mesanetworks.net wrote:

Just how often do you have to poke at the keyboard? And
when you do poke at it, about how many key presses do you make before
you get the number of bits you requested?


Whenever I do a fresh system build, I use /dev/random to generate a 32 
byte LUKS key:


# dd if=/dev/random of=/root/.luks-keyfile bs=1 count=32
32+0 records in
32+0 records out
32 bytes (32 B) copied, 36.2822 s, 0.0 kB/s


If the machine has been recently booted, /dev/random blocks (note run 
time in final line of example, above).  I typically run ping, CVS, or 
other network related commands in another terminal until /dev/random 
completes, believing that processor interrupts also feed the random 
number entropy pool (?).  Typically a half dozen such commands are enough.




I'm wondering is this a
event with which many Debianers are quite familiar, or is it more
like something of a rare event that people know about, but most
have never actually had it happen to them?


I encounter the above case several times each year.


HTH,

David


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: https://lists.debian.org/53db0914.9040...@holgerdanske.com



/dev/random vs /dev/urandom

2013-04-21 Thread Pol Hallen
Hi folks!

I need create a block file, later use it like archive (with dm).

What is better use?

/dev/random or /dev/urandom?

thanks!

Pol


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/517421c9.1040...@fuckaround.org



Re: /dev/random vs /dev/urandom

2013-04-21 Thread Jochen Spieker
Pol Hallen:
 Hi folks!
 
 I need create a block file, later use it like archive (with dm).
 
 What is better use?
 
 /dev/random or /dev/urandom?

Define better. /dev/random is cryptographically more secure.
/dev/random is faster.

J.
-- 
I lust after strangers but only date people from the office.
[Agree]   [Disagree]
 http://www.slowlydownward.com/NODATA/data_enter2.html


signature.asc
Description: Digital signature


Re: /dev/random vs /dev/urandom

2013-04-21 Thread Pol Hallen
 Define better.

better = secure (high level of security) :-)

 /dev/random is cryptographically more secure.

do you mean /dev/urandom is [...]?

 /dev/random is faster.

thanks!

Pol


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51742a1f.3010...@fuckaround.org



Re: /dev/random vs /dev/urandom

2013-04-21 Thread Jerome BENOIT

Hello List,

On 21/04/13 20:04, Pol Hallen wrote:

Define better.


better = secure (high level of security) :-)


/dev/random is cryptographically more secure.


do you mean /dev/urandom is [...]?


/dev/random is faster.


thanks!



man 4 random


Pol



hth,
Jerome






--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/51742e12.5030...@rezozer.net



Re: /dev/random vs /dev/urandom

2013-04-21 Thread Pascal Hambourg
Pol Hallen a écrit :
 Define better.
 
 better = secure (high level of security) :-)
 
 /dev/random is cryptographically more secure.
 
 do you mean /dev/urandom is [...]?

Not here.

 /dev/random is faster.

But here.
/dev/random is more random.
/dev/urandom is faster.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51742bdd.40...@plouf.fr.eu.org



Re: /dev/random vs /dev/urandom

2013-04-21 Thread Kevin Chadwick
 Hi folks!
 
 I need create a block file, later use it like archive (with dm).
 
 What is better use?
 
 /dev/random or /dev/urandom?
 
 thanks!
 
 Pol
 

You might want to install haveged. You can use that directly without
affecting your system entropy.

 
 -- 
 To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org Archive:
 http://lists.debian.org/517421c9.1040...@fuckaround.org
 


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)
___


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130421205142.41dfa...@kc-sys.chadwicks.me.uk



Re: /dev/random vs /dev/urandom

2013-04-21 Thread Jochen Spieker
Pascal Hambourg:
 Pol Hallen a écrit :
 
 /dev/random is cryptographically more secure.
 
 do you mean /dev/urandom is [...]?
 
 Not here.
 
 /dev/random is faster.
 
 But here.
 /dev/random is more random.
 /dev/urandom is faster.

Exactly, thanks. My 'u' key gets stck sometimes. :)

J.
-- 
I have never been happier than I am now; a fact which depresses me
immensely.
[Agree]   [Disagree]
 http://www.slowlydownward.com/NODATA/data_enter2.html


signature.asc
Description: Digital signature


Re: use another /dev/tty0 as /dev/random

2013-02-22 Thread Dick Thomas
worked it out, i neeed the app rng-tools and set my device as /dev/foo :)

About.me http://about.me/dick.thomas
Blog: www.xpd259.co.uk
G+:   www.google.com/profiles/xpd259
gpg key: C791809B


On 22 February 2013 17:05, Dick Thomas xpd...@gmail.com wrote:
 I'm making a random number generator out of bit and Arduino
 but that isn't the question


 my Question is is it possible to use a serial imput from the Arduino
 as /dev/random
 I've no idea what to even google to do this

 any help or pointers where to start would be fantastic


 Dick

 About.me http://about.me/dick.thomas
 Blog: www.xpd259.co.uk
 G+:   www.google.com/profiles/xpd259
 gpg key: C791809B


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAGe0=N2MtdgrwnN9z+vtxUa0BE1Ld5LX=8xm9n+zd_qrsvo...@mail.gmail.com



use another /dev/tty0 as /dev/random

2013-02-22 Thread Dick Thomas
I'm making a random number generator out of bit and Arduino
but that isn't the question


my Question is is it possible to use a serial imput from the Arduino
as /dev/random
I've no idea what to even google to do this

any help or pointers where to start would be fantastic


Dick

About.me http://about.me/dick.thomas
Blog: www.xpd259.co.uk
G+:   www.google.com/profiles/xpd259
gpg key: C791809B


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAGe0=N2UfeUHghpX2nsE5r2z1FTLTxNtu+6hnwCcZT2QSW+=i...@mail.gmail.com



/dev/random rate

2010-01-13 Thread Stanisław T. Findeisen
I am trying to generate an SSL key using OpenSSL and /dev/random . However, it 
looks that the entropy generation rate is very low. Everything works in less 
than a second if I use /dev/urandom, but with /dev/random I can strace the 
process and see it reading about 8 bytes per second (even though I generate as 
much noise as I can (mouse+keyboard+network)).

read(4, \332\242_\26\360\3140e..., 190) = 8
read(4, \256\212\263-~\245n\37..., 182) = 8
read(4, \33a\f\...@\327\274d..., 174) = 8
read(4, \364\325\327D\261\r\346\233..., 166) = 8
read(4, \237\327}r3\24S\334..., 158)  = 8
read(4, q\204\237\252\261\2515,..., 150) = 8
read(4, W\320A\331`8\201\252..., 142) = 8
read(4, o\257\314\363\270B\206\331..., 134) = 8

Any ideas? You can try this:

strace openssl genrsa -out test.random -rand /dev/random 1024

on your system and tell me what you see. :-)

STF

http://eisenbits.homelinux.net/~stf/
OpenPGP: DFD9 0146 3794 9CF6 17EA  D63F DBF5 8AA8 3B31 FE8A


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: /dev/random rate

2010-01-13 Thread Steve Kemp
On Thu Jan 14, 2010 at 01:43:39 +0100, Stanis??aw T. Findeisen wrote:

 I am trying to generate an SSL key using OpenSSL and /dev/random .
 However, it looks that the entropy generation rate is very low.

  ..

 Any ideas? You can try this:

  You can see the amount of available entropy via:

  s...@gold:~$  cat /proc/sys/kernel/random/entropy_avail
  1902
  s...@gold:~$

  I would guess that you have little available before, during, and
 after the generation.  YOu could try to fix this via one of the
 sources.

  (e.g. big network traffic / the addition of rng-tools or similar.)

Steve
--
Debian GNU/Linux System Administration
http://www.debian-administration.org/


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: /dev/random vide !?

2003-06-07 Thread Nicolas Mass
On 30 May 2003 18:53:15 +0200
Philippe Amelant [EMAIL PROTECTED] wrote:

 Bonjour,
 
 Je viens d'installer cyrus-imap sur un serveur.
 Tout à l'air OK sauf le serveur POP3...
 bizarre ...
 je cherche un peu, le met en debug, et là on voit qu'il bloque pour lire
 un fichier. 
 Je cherche un peu sur la ML de cyrus et là je vois quelqu'un avec le
 même problème, auquel on lui à répondu qu'il manquait d'entropie.
 je vérifie et effectivement mon /dev/random et vide, et ne se rempli
 jamais !
 En cherchant un peu plus, j'ai trouvé que /dev/random devrait ce remplir
 à plus de 10 octet/s sur une machine idle, alors que moi c'est 0 à
 l'heure !!

cat /dev/random n'affiche rien ?

 Est ce que quelqu'un à déjà eut ce genre de problème ou sait comment le
 résoudre ?

As tu activé le support du générateur matériel de nombres aléatoires dans le 
noyau ?
Section Char devices (ça vient peut-etre de là)

 Je precise que c'est un noyau 2.4.18 sur une woody



/dev/random vide !?

2003-05-30 Thread Philippe Amelant
Bonjour,

Je viens d'installer cyrus-imap sur un serveur.
Tout à l'air OK sauf le serveur POP3...
bizarre ...
je cherche un peu, le met en debug, et là on voit qu'il bloque pour lire
un fichier. 
Je cherche un peu sur la ML de cyrus et là je vois quelqu'un avec le
même problème, auquel on lui à répondu qu'il manquait d'entropie.
je vérifie et effectivement mon /dev/random et vide, et ne se rempli
jamais !
En cherchant un peu plus, j'ai trouvé que /dev/random devrait ce remplir
à plus de 10 octet/s sur une machine idle, alors que moi c'est 0 à
l'heure !!
Est ce que quelqu'un à déjà eut ce genre de problème ou sait comment le
résoudre ?

Je precise que c'est un noyau 2.4.18 sur une woody

Merci

-- 
Philippe Amelant [EMAIL PROTECTED]