From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Marko Kreen <marko(at)l-t(dot)ee> |
Cc: | pgsql-patches(at)postgresql(dot)org |
Subject: | Re: [patch 2/3] Fortuna fixes |
Date: | 2005-07-18 17:13:15 |
Message-ID: | 14159.1121706795@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-patches |
Marko Kreen <marko(at)l-t(dot)ee> writes:
> After studying Fortuna more, I found out that I missed
> some of the details.
> - reseeding should happen only if pool #0 has aquired additional
> entropy.
> - a 'rekeying' operation should happend after each request and
> also after 1M of extracted data. That means taking next two
> blocks and using it as new key.
> - Fortuna _really_ wants entropy sources to be somewhat unpredictible.
> So roll dice when adding it and also add them to pools randomly,
> not sequentially.
> This hopefully makes harder for someone to doctor with the
> internal state (as in our case user can directly control
> what goes into it).
> That also drops the idea of several sources - which really
> fits more to hardware backed event sources.
> - add a really obvious obfuscation: take the absolutely first
> block be initial counter value. If Fortuna (AES to be exact)
> is secure with known counter value, then it should be also
> secure with unknown counter value. This does not go against
> the important property of counter - that the bit-pattern repeat
> period should be as long as possible.
> - S2K functions should use px_get_pseudo_random_bytes not
> px_get_random_bytes.
Applied.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2005-07-18 17:17:33 | Re: [patch 3/3] new documentation |
Previous Message | Tom Lane | 2005-07-18 17:09:28 | Re: [patch 1/3] small cleanups |