[openssl-users] Seeding before RSA key generation

Jakob Bohm jb-openssl at wisemo.com
Thu Oct 4 15:58:43 UTC 2018


On 04/10/2018 17:38, Salz, Rich wrote:
>>     What's supposedly bad about the 1.0.x/1.1.0 OpenSSL RNG other
>      than not being an NSA/NIST design?
>    
> Poor locking; been known to crash.

Simple bug, not a reason to change the algorithm.

> 
> Does not reseed.

But can be reseeded if so desired, subject to locking.

> 
> Global across the process, rather than isolated for private-key generation or per-connection.

This is good, not bad.

> 
> Mixes in getpid and time to get "better" random bytes.

This gives 2 to 5 extra bits on machines with little available entropy,
provided init is not done too early in the machine boot process.  There
seem to be much stronger sources loaded where available.

> 
> Has a "pseudo-rand" feature.

This is a clearly marked feature useful when the entropy sources are
significantly slower than the random bit need, such as on a busy TLS
server with a serial port (or slower) entropy source.

> 
> Never was cryptographically evaluated.
> 

By whom?, I would expect the very public OpenSSL RNG to have been
subjected to lots of 3rd party review outside the Foundation.

The new design is taken from a document that was insufficiently publicly
reviewed and was later found to contain a likely backdoor in one of its
other suggested RNG designs, making the entire document highly dubious.




Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded


More information about the openssl-users mailing list