tag:blogger.com,1999:blog-833174317742362874.post6732212943806952940..comments2024-03-28T00:40:14.035-07:00Comments on Insane Coding: Common LibreSSL porting mistakesinsane coderhttp://www.blogger.com/profile/06901386115570670209noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-833174317742362874.post-12020751906931235122023-11-27T00:04:52.792-08:002023-11-27T00:04:52.792-08:00Your blog is delightful and truly outstanding.
...Your blog is delightful and truly outstanding. <br /><br /><br /><br /><br /><a href="https://takemycoursesforme.com/" rel="nofollow">Pay Someone To Take Online Courses For Me</a><br />Michael Whitehttps://www.blogger.com/profile/15818345395773479182noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-30377041946478029642021-12-12T21:29:33.792-08:002021-12-12T21:29:33.792-08:00Hi....
The other day I wrote an article discussing...Hi....<br />The other day I wrote an article discussing LibreSSL, and the common mistakes being made by those thinking they know how to port it to other ...<br />You are also read more <a href="https://www.easyloanmart.in/business-loan.php" rel="nofollow">Online Business Loan in India</a><br />Easy Loan Marthttps://www.blogger.com/profile/07495925139492900808noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-49609693322408173392021-11-09T03:38:43.308-08:002021-11-09T03:38:43.308-08:00I really like this site, it's really great. I ...I really like this site, it's really great. I also visit your other articles and they are also very helpful, I am waiting for your next update because I like all your articles. for More Details Click Here:- <a href="https://www.aolemailsupports.com/install-aol-desktop-gold/" rel="nofollow"><b>Install AOL Desktop Gold</b></a>Sophia Kellyhttps://www.blogger.com/profile/06369328950044784108noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-8957762314516346082020-08-05T05:58:48.544-07:002020-08-05T05:58:48.544-07:00Epson printer Setup MAC, utilities and application...<a href="https://allitexpert.com/blog/epson-printer-installation-guide-for-windows-or-mac/" rel="nofollow">Epson printer Setup MAC</a>, utilities and applications are accessible to download for nothing out of pocket from the ... Printers: you should download and introduce the Driver. <br />augustwalkerhttps://www.blogger.com/profile/04569162127148957693noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-52937650998891520692018-12-12T21:21:55.413-08:002018-12-12T21:21:55.413-08:00Wow ..! your article is informative as usual,
Keep...Wow ..! your article is informative as usual,<br />Keep it Up! <br />Meet the best training institute in Bangalore, trained 5000+ people, Get personalized training from industrial experts, with Hans on experience. <br /><br /><a href="https://www.be-practical.com/angularjs-7-training-in-bangalore.html" rel="nofollow">Top Angular JS training in Bangalore</a><br /><a href="https://www.be-practical.com/React-JS-Training-in-Bangalore.html" rel="nofollow">Top React JS training in Bangalore</a><br /><a href="https://www.be-practical.com/node-JS-Training-in-Bangalore.html" rel="nofollow">Top Node JS training in Bangalore</a>mansurhttps://www.blogger.com/profile/00281727736063922114noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-70569482258951229052014-07-17T13:15:51.282-07:002014-07-17T13:15:51.282-07:00Hello Harry,
Regarding that article, it's mos...Hello Harry,<br /><br />Regarding that article, it's mostly accurate, although misses some key points.<br /><br />It doesn't discuss actual difficulty in using /dev/(u)random correctly.<br /><br />It takes a stance which conflicts with the actual stance by the creator of /dev/(u)random (you can't have it both ways, either you trust its design and use it as its meant to, or you don't trust its design and avoid it).<br /><br />It also fails to take into account that some implementations which may still be in use have a slew of problems.<br /><br /><br />Please see my following two articles:<br /><br />http://insanecoding.blogspot.com/2014/05/a-good-idea-with-bad-usage-devurandom.html<br /><br />http://insanecoding.blogspot.com/2014/05/dealing-with-randomness.html<br /><br />To summarize them:<br />1) /dev/(u)random is hard to use correctly.<br />2) /dev/(u)random in some situations doesn't return random enough data.<br />3) /dev/(u)random despite its problems is generally the best option available, but there's ways to improve upon it.<br />4) Even if you use /dev/(u)random correctly, the code making use of it still has many ways it can go wrong, so your application may still not be safe.insane coderhttps://www.blogger.com/profile/06901386115570670209noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-69399995019833685732014-07-15T12:58:38.360-07:002014-07-15T12:58:38.360-07:00hej insane coder;
noice read although, although,...hej insane coder; <br /><br />noice read although, although, what i learned from people who (probably) have a clue about crypto, and are talking/writing about it: i'd better stay away from it. <br /><br />lately i came across the following article and would like your short opinion about it: <br /><br />http://www.2uo.de/myths-about-urandom/<br /><br /><br />cheers, <br /><br />lharryAnonymoushttps://www.blogger.com/profile/18395711033260821108noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-29310920953588694632014-05-29T08:48:03.922-07:002014-05-29T08:48:03.922-07:00> I'm on my period said...
> Carlos is c...> I'm on my period said...<br />> Carlos is correct. Talking shit without the community sense to solve it is just being a bitchy gossip.<br /><br />So Insane Coder should quit his job, give up his house, family, and friends, and move into the alley next to his local free internet cafe, all so that he can devote enough time to finding each and every one of these horrendous ports that keep popping up and fixing them one by one? Sorry, but "community sense" doesn't apply when the "community" shouldn't exist in the first place.<br /><br />LibreSSL has said that they're planning to do proper ports if and when they have the funding and the stable codebase to work from, but the "community" knew better, and started making unofficial ports within a week of LibreSSL starting up, with no release version in sight, and without a clue about what the LibreSSL team was actually trying to accomplish. And rather than understanding the mistakes the "community" is making and avoiding these cheap knock-offs, you instead blame the person pointing out the mistakes for "not fixing them"? I don't know how it works where you come from, but in my world, people are responsible for their own mistakes. The people who made these terrible ports are responsible for the security flaws in them, and the people who blindly use them are responsible for their own ignorance. End of story.Joe P.https://www.blogger.com/profile/12986115322359249956noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-82227521864519325402014-05-25T11:48:08.721-07:002014-05-25T11:48:08.721-07:00Carlos is correct. Talking shit without the commu...Carlos is correct. Talking shit without the community sense to solve it is just being a bitchy gossip.<br /><br />Furthermore, it shows that by LibreSSL not taking leadership over the threshold in a way that OpenSSH Portable has become widely popular. It would be cleaner and less net effort to consolidate porting efforts to a single project under OpenBSD..https://www.blogger.com/profile/17170351345785689664noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-44057176937160654022014-05-20T12:28:01.254-07:002014-05-20T12:28:01.254-07:00Since enough people were writing to me about /dev/...Since enough people were writing to me about /dev/random vs. /dev/urandom, I wrote an <a href="http://insanecoding.blogspot.com/2014/05/dealing-with-randomness.html" rel="nofollow">article</a> about it an other practical problems.insane coderhttps://www.blogger.com/profile/06901386115570670209noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-50789079675257905722014-05-05T15:10:12.678-07:002014-05-05T15:10:12.678-07:00Max, I wouldn't blame you, on rereading what I...Max, I wouldn't blame you, on rereading what I wrote, I think my line was somewhat confusing. I received half a dozen e-mails from people seeming to think I was fixating specifically on /dev/urandom, and that I was suggesting one must use /dev/random on Linux. So you're not alone.<br /><br />I meant to say some existing practices were unsafe, and I was referring to some specific examples.<br /><br />I probably should have written something like: <i>Using /dev/urandom unsafely on Linux, with a fallback on gettimeofday(), is a poor source of entropy. Doing so to generate long-lived keys is dangerous.</i><br />I wrote this article in a rush in a response to those asking me to clarify my previous article with some specifics, and in this section, I wasn't careful in how I phrased it.<br /><br />Unfortunately most readers seem to focus on one thing which doesn't sound right to them, and ignore all the good points raised :(insane coderhttps://www.blogger.com/profile/06901386115570670209noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-6972709470885137902014-05-05T13:00:59.538-07:002014-05-05T13:00:59.538-07:00I'm sorry; I'll take the blame for the div...I'm sorry; I'll take the blame for the divergence on /dev/random vs /dev/urandom. My link to quotes by cryptographers on /dev/urandom happened to be part of a larger article about why the blocking nature of /dev/random is unnecessary.<br /><br />Now I see that the problem isn't in whether the bytes are sufficiently unpredictable (what the cryptographers were commenting on) but on potential trouble with the interface.Max Lybberthttps://www.blogger.com/profile/13935322217857952629noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-20131214874902539282014-05-03T22:11:12.748-07:002014-05-03T22:11:12.748-07:00William, I don't think you understood what I w...William, I don't think you understood what I was getting at here. This was not about /dev/random vs dev/urandom.<br /><br />The problems are way more severe than you describe.<br /><br />Your safest way to gather entropy in Linux has also been removed some time ago.<br /><br />Max, and everyone else: <a href="http://insanecoding.blogspot.com/2014/05/a-good-idea-with-bad-usage-devurandom.html" rel="nofollow">The follow up</a>insane coderhttps://www.blogger.com/profile/06901386115570670209noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-51194791212119792762014-05-03T18:03:30.681-07:002014-05-03T18:03:30.681-07:00Thank you William for your comments, and I'll ...Thank you William for your comments, and I'll look forward to the blog post from insane coder.Max Lybberthttps://www.blogger.com/profile/13935322217857952629noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-35648423038308815582014-05-03T14:12:09.448-07:002014-05-03T14:12:09.448-07:00There is nothing inherently wrong with the entropy...There is nothing inherently wrong with the entropy of /dev/urandom. This blogger is wrong about that, IMHO. You certainly can't use /dev/random on Linux, because it could block indefinitely. And in any event if /dev/urandom is broken so is /dev/random. Entropy guesstimation in this kind of application context is a flawed and unworkable idea, which is why OpenBSD doesn't even have a blocking /dev/random.<br /><br />There are inherent problems with using a /dev device, though. 1) It won't exist in most chroot jails (ideally your chroot jail is mounted nodev); and 2) even if it exists, it might not be openable because you've hit the process descriptor limit.<br /><br />The safest way to gather entropy in Linux is by using a little known sysctl. The mibs are CTL_KERN + KERN_RANDOM + RANDOM_UUID. This pulls from the same internal entropy source as /dev/urandom, but doesn't require acquiring a file descriptor.<br /><br />OpenBSD, NetBSD, and FreeBSD (as of 10.0) all use a sysctl to access the kernel CSPRNG.Anonymoushttps://www.blogger.com/profile/17382185719780029273noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-30969772233661558362014-05-03T11:36:31.877-07:002014-05-03T11:36:31.877-07:00Max,
There are a ton of gotchas to using /dev/ura...Max,<br /><br />There are a ton of gotchas to using /dev/urandom (or /dev/random for that matter). I will write an article about that. insane coderhttps://www.blogger.com/profile/06901386115570670209noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-39128165026423089532014-05-02T10:15:46.647-07:002014-05-02T10:15:46.647-07:00Poor arc4random_buf() implementations. This functi...<i> Poor arc4random_buf() implementations. This function is supposed to fill a buffer using a cryptographically secure pseudorandom number generator. However, I'm seeing a whole class of dumbness here: ... Using poor sources of entropy like /dev/urandom on Linux ... and using them to generate long-lived keys.</i><br /><br />I'm curious about this statement. /dev/urandom on Linux works by collecting entropy and then running it through a cryptographically secure number generator, so I'm not clear on the difference between that and arc4random_buf(). Especially given recent statements by cryptographers that (except for during boot when there isn't much entropy in the pool) /dev/urandom is good enough for actual use ( http://www.2uo.de/myths-about-urandom/#experts ). Am I missing something?Max Lybberthttps://www.blogger.com/profile/13935322217857952629noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-88563914796486925242014-05-02T09:57:45.434-07:002014-05-02T09:57:45.434-07:00http://sockpuppet.org/blog/2014/02/25/safely-gener...http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/voodooKobrahttps://www.blogger.com/profile/14047852023484580251noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-34500742491336749612014-05-02T04:57:13.724-07:002014-05-02T04:57:13.724-07:00I specifically told the author of one of the porti...I specifically told the author of one of the porting projects floating around out there about it.<br /><br />Unfortunately though, there are a bunch of porting projects popping up, and I'm not going to stay on top of all of them.<br /><br />Furthermore, I myself don't necessarily even know the full extent of problems out there. This is meant as a warning to not use any LibreSSL port except from the LibreSSL team itself.insane coderhttps://www.blogger.com/profile/06901386115570670209noreply@blogger.comtag:blogger.com,1999:blog-833174317742362874.post-44917091852172035262014-05-02T04:49:37.177-07:002014-05-02T04:49:37.177-07:00Are you posting these problems to their issue trac...Are you posting these problems to their issue tracker? Or better yet, send patches fixing them?carloshttps://www.blogger.com/profile/11805948519682059427noreply@blogger.com