[dsfjdssdfsd] Fwd: New Version Notification for draft-sheffer-dhc-initial-random-00.txt

Yaron Sheffer <yaronf.ietf@gmail.com> Wed, 04 December 2013 22:10 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: dsfjdssdfsd@ietfa.amsl.com
Delivered-To: dsfjdssdfsd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com []) by ietfa.amsl.com (Postfix) with ESMTP id 714301AD8F5 for <dsfjdssdfsd@ietfa.amsl.com>; Wed, 4 Dec 2013 14:10:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id SOrA34M1IP9O for <dsfjdssdfsd@ietfa.amsl.com>; Wed, 4 Dec 2013 14:10:57 -0800 (PST)
Received: from mail-ee0-x234.google.com (mail-ee0-x234.google.com [IPv6:2a00:1450:4013:c00::234]) by ietfa.amsl.com (Postfix) with ESMTP id 2CCEC1AD8E2 for <dsfjdssdfsd@ietf.org>; Wed, 4 Dec 2013 14:10:57 -0800 (PST)
Received: by mail-ee0-f52.google.com with SMTP id d17so2560463eek.25 for <dsfjdssdfsd@ietf.org>; Wed, 04 Dec 2013 14:10:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=WeWKhUqtdyOzaPWZT3hMpA7j4geGF35F7Sgm1VqYcWc=; b=qs0Oq1kWkYfFYlFLNO/AwgtuUonV/xZe9nGWMJ1olniUqjmzeqF8PpkeASS5af3fGd AGLDVXOhOnuwH2AGZVmXeN3tsxtLDveotm6aU690ULfCCAOLaB+d+hRezmOrBSe/uVaw IcuLYsDl5VSmEQIEtLlW2EIiEpSRs/B8vWKv38z/BuMj4FiCxaOtkHULysAW8Okt2HzI EO28dU6XSjB9GuImFdc4BUVc+1mhuQXwYHsDbNdLRAJVPCOXAZuY1WlosKYLr9+b+4Qf 3A5wQucO0bZBK/9/HcC2l+Vpf+yhyxZE+xnyFCN6oOuU5PdTim73gm8IO3Hp5UHLyg9/ 2Pfg==
X-Received: by with SMTP id e5mr9312324eeh.91.1386195053616; Wed, 04 Dec 2013 14:10:53 -0800 (PST)
Received: from [] ([]) by mx.google.com with ESMTPSA id e43sm88011801eep.7.2013. for <dsfjdssdfsd@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 04 Dec 2013 14:10:53 -0800 (PST)
Message-ID: <529FA86B.7080603@gmail.com>
Date: Thu, 05 Dec 2013 00:10:51 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: "<dsfjdssdfsd@ietf.org>" <dsfjdssdfsd@ietf.org>
References: <20131204220553.28774.91249.idtracker@ietfa.amsl.com>
In-Reply-To: <20131204220553.28774.91249.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20131204220553.28774.91249.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [dsfjdssdfsd] Fwd: New Version Notification for draft-sheffer-dhc-initial-random-00.txt
X-BeenThere: dsfjdssdfsd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols, for example related to updating RFC 4086." <dsfjdssdfsd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dsfjdssdfsd/>
List-Post: <mailto:dsfjdssdfsd@ietf.org>
List-Help: <mailto:dsfjdssdfsd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Dec 2013 22:10:59 -0000


Here's Paul and I adding some random bits into the pool...

Your comments are welcome!


-------- Original Message --------
Subject: New Version Notification for 
Date: Wed, 04 Dec 2013 14:05:53 -0800
From: internet-drafts@ietf.org
To: Yaron Sheffer <yaronf.ietf@gmail.com>, Paul Hoffman 
<paul.hoffman@vpnc.org>, Paul E. Hoffman <paul.hoffman@vpnc.org>

A new version of I-D, draft-sheffer-dhc-initial-random-00.txt
has been successfully submitted by Yaron Sheffer and posted to the
IETF repository.

Filename:	 draft-sheffer-dhc-initial-random
Revision:	 00
Title:		 A DHCP Extension To Provide Initial Random Material
Creation date:	 2013-12-05
Group:		 Individual Submission
Number of pages: 8

    Some network devices get little or no entropy from their underlying
    operating systems when they are first started.  As a result,
    cryptographic applications started before there is sufficient entropy
    in the operating system's pool can be initialized into a state that
    can be exploited by an attacker.  This document defines a DHCP
    extension that can provide the operating system of a network device
    with some initial randomness that can only be known by an attacker
    who is on the same network segment as the device and its DHCP server.
    The operating system can mix this random input into its random pool
    early in the boot procedure and thus have more entropy available when
    cryptographic applications start.


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat