Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
Hi, I and a few other users are seeing sshd failing with Couldn't obtain random bytes (error 604389476) and other ssl-related application failing randomly in user mode linux guests and I suspect a problem in openssl that got triggered by some change in UML. I reviewed the RAND_poll function

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
Stanislav Meduna wrote: - add r = -1; inside the do loop after the int try_read = 0; Erm, actually I mean r = -1; errno = EAGAIN; or something like that - it has to let the while know that the poll timed out. -- Stano

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
Tomas Mraz wrote: errno has garbage value - this should be fixed by initializing errno to 0 before the poll/select calls. Actually after it returns with timeout - a successfull syscall is free to set errno to whatever value it wants, it is only after an error the value has to be meaningful (I

Re: Couldn't obtain random bytes in sshd - problem in RAND_poll?

2008-08-06 Thread Stanislav Meduna
David Schwartz wrote: Try launching your test program automatically on boot up at the saem time you launch ssh or whatever application is failing. I bet '/dev/urandom' will fail then. The program had no problems running with simultaneous od -x /dev/random, that was blocking because it sucked

Re: [uml-devel] /dev/random problems .. or FP registers corruption?!

2008-08-07 Thread Stanislav Meduna
Stanislav Meduna wrote: Am I seeing ghosts? Anyone got other mysterious problems with current UML kernel? Could it be that some state-saving method is corrupting fp registers or something like that? Was there some change in the UML / vanilla kernel recently? Confirmed: I can reproduce openssl

Re: [uml-devel] /dev/random problems .. or FP registers corruption?!

2008-08-07 Thread Stanislav Meduna
Richard Salz wrote: Your test is wrong. NaN != NaN. My test is right. Please, look into the code and the previous discussion. The whole point of the test is that the x0/x1 are mysteriously changed from outside of the process. The test will run indefinitely (well until precision suffices)

Re: Generating randomness in userspace

2011-08-12 Thread Stanislav Meduna
On 11.08.2011 21:33, Vegard Nossum wrote: I've written a small program that gathers randomness from the uncertainty of scheduling between threads/cores in a multithreaded program/system. Hmm my gut feeling is that this is not random enough that it matters. The OS schedulers are actually quite

Re: Generating randomness in userspace

2011-08-13 Thread Stanislav Meduna
On 13.08.2011 10:09, Kyle Hamilton wrote: See also http://egd.sourceforge.net/ (Entropy Gathering Daemon, written in perl) EGD is meant for systems where the /dev/random is not present/accessible. Assuming the /dev/random takes the entropy from all sources affecting the scheduling of

Re: OS-independent entropy source?

2012-01-14 Thread Stanislav Meduna
On 14.01.2012 17:34, Andy Polyakov wrote: Comments on http://www.openssl.org/~appro/OPENSSL_instrument_bus/ are welcomed. I did not analyse the architecture of tested processors to check how many frequencies they are using and how they are generating them, but isn't this just manifestation of

Re: OS-independent entropy source?

2012-01-16 Thread Stanislav Meduna
On 16.01.2012 10:30, Andy Polyakov wrote: Are you aware of any quantitative PLL characteristics that can be relevant in the context? Can *you* argue in favor of the hypothesis? It's essential that somebody else but me argues to confirm or dismiss it. Unfortunately I lack the math needed to do

Re: OS-independent entropy source?

2012-01-17 Thread Stanislav Meduna
On 17.01.2012 16:52, Andy Polyakov wrote: Maybe relevant question is not how [in]predictable is PLL's reaction on input frequency variation, but that there is one. I mean even if PLL reaction is predictable, *when* [thermal] variation and consequent reaction occurs is not, right? Right, if

Re: OS-independent entropy source?

2012-01-17 Thread Stanislav Meduna
On 17.01.2012 21:52, Andy Polyakov wrote: Out of curiosity: Does the picture change if you are running the test hardware in a refrigerator at -20 degrees celsius and at say 40 degrees? ;) Do *you* keep your systems in fridge? If so, how do you deal with condensate when you take them out

Re: OS-independent entropy source?

2012-01-17 Thread Stanislav Meduna
On 17.01.2012 22:47, Andy Polyakov wrote: Come on, having me preparing bootable CF card image for a gizmo I'm not familiar with is unrealistic. Don't you have anything you can compile 10-lines C code and some assembler to add to? Well you mentioned tests on x86 in your paper, I thought you do

Re: OS-independent entropy source?

2012-01-17 Thread Stanislav Meduna
On 17.01.2012 23:55, Peter Waltenberg wrote: I think my point is valid though - even if it is a PRNG, provided it's a good one (and distribution will tell you that) if an attacker can't tell exactly when you are sampling the PRNG effectively it's a usable entropy source. One of the problems

Re: understanding openssl entropy

2012-02-18 Thread Stanislav Meduna
On 18.02.2012 17:02, Edward Ned Harvey wrote: So these studies went out and scoured the internet, collecting public keys from every service they could find, which amounts to something like 1-2 million servers, and they scanned them all for identical keys and/or shared factors. They found

Re: understanding openssl entropy

2012-02-18 Thread Stanislav Meduna
On 18.02.2012 22:47, Edward Ned Harvey wrote: Any link to the studies? - I was not able to find anything relevant. Is this related to the 2008 Debian OpenSSL snafu? Not the debian thing. http://arstechnica.com/business/news/2012/02/crypto-shocker-four-of-every-10