Re: [dsfjdssdfsd] Discussion: Malicious Entropy Attacks: Eggs, and Baskets

Krisztián Pintér <pinterkr@gmail.com> Sat, 15 March 2014 15:50 UTC

Return-Path: <pinterkr@gmail.com>
X-Original-To: dsfjdssdfsd@ietfa.amsl.com
Delivered-To: dsfjdssdfsd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C985B1A0218 for <dsfjdssdfsd@ietfa.amsl.com>; Sat, 15 Mar 2014 08:50:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level:
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mxiSx2tX4ra4 for <dsfjdssdfsd@ietfa.amsl.com>; Sat, 15 Mar 2014 08:50:50 -0700 (PDT)
Received: from mail-ee0-x233.google.com (mail-ee0-x233.google.com [IPv6:2a00:1450:4013:c00::233]) by ietfa.amsl.com (Postfix) with ESMTP id 8A4D21A020A for <dsfjdssdfsd@ietf.org>; Sat, 15 Mar 2014 08:50:50 -0700 (PDT)
Received: by mail-ee0-f51.google.com with SMTP id c13so2485485eek.10 for <dsfjdssdfsd@ietf.org>; Sat, 15 Mar 2014 08:50:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=date:from:message-id:to:subject:in-reply-to:references:mime-version :content-type:content-transfer-encoding; bh=8vDiwcJojknb9xTAIowcYh4j276efk83aVKfWHP15zc=; b=GR+cfeoZPDE++nPuEetU/Ph7rI7JvueJkQgjTbC03GWw7pZOBTPIPKJZqYSy+vzO34 yg89krzlsn+A5BZXNbShCzWz9CkMYPKDLeagAe8iqqsqoBHhQSBUXeAx+vaFDzG7p8Zx qhKzPOeQ9B/V34hUtK1mm8FezKG6OrhKA9fFvl4glFdwU6Jopr5rKL3yNfL4hkGhMwAJ 1QZZhGHo/hJB+/dJ0156yV6r5PwWBSYusKReqP5UhdMYMeogx7KHybmLPJDfw38B8dw8 c6z5xTjDZxYzK0y/kQl2pZKj+BaaVDj+VUiqvLYIGuvTfCjcZsAL2bn4g6nCkoAu5nUN aFWw==
X-Received: by 10.15.64.75 with SMTP id n51mr6097415eex.33.1394898641300; Sat, 15 Mar 2014 08:50:41 -0700 (PDT)
Received: from [192.168.2.244] (catv-176-63-52-22.catv.broadband.hu. [176.63.52.22]) by mx.google.com with ESMTPSA id m8sm25506186eef.14.2014.03.15.08.50.40 for <dsfjdssdfsd@ietf.org> (version=TLSv1 cipher=RC4-SHA bits=128/128); Sat, 15 Mar 2014 08:50:40 -0700 (PDT)
Date: Sat, 15 Mar 2014 16:50:37 +0100
From: =?iso-8859-15?Q?Kriszti=E1n_Pint=E9r?= <pinterkr@gmail.com>
X-Priority: 3 (Normal)
Message-ID: <56491888.20140315165037@gmail.com>
To: dsfjdssdfsd@ietf.org
In-Reply-To: <F3B65184-1544-48FA-8C20-52FEAC208D8A@me.com>
References: <531F6068.4080907@akr.io> <20140311195443.GD2190@thunk.org> <F3B65184-1544-48FA-8C20-52FEAC208D8A@me.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dsfjdssdfsd/78HPKgJvIzWMFh5yxiuzTc63FmI
Subject: Re: [dsfjdssdfsd] Discussion: Malicious Entropy Attacks: Eggs, and Baskets
X-BeenThere: dsfjdssdfsd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols, for example related to updating RFC 4086." <dsfjdssdfsd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dsfjdssdfsd/>
List-Post: <mailto:dsfjdssdfsd@ietf.org>
List-Help: <mailto:dsfjdssdfsd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Mar 2014 15:50:52 -0000

Arnold Reinhold (at Friday, March 14, 2014, 5:20:56 PM):
> Here are some scenarios where recovery from a state compromise would be important:
> o A bug in system software that exposes PRNG state only rarely
> o An attack that that exposes PRNG state in a system that is well
> guarded against covert channels, limiting undetected outbound messages to very low bit rate
[...]

and these are the attacks about which djb says: your system is broken.
don't patch it, fix it. if such attacks could be carried out, session
keys or long term keys might have been compromised. recovering your
prng won't help that, the damage has been done.

it is not the way to reduce the chance of any attack by a small
factor, let the factor be a 100, or even a million, it is still small.
what we want is systems that are reliable and safe. and if our system
is safe, we don't need reseeding.