Replies: 2 comments 1 reply
-
Sounds good, you're talking about a function within nwipe to test entropy? If so can that function also be called to test the first block of data generated by the aes prngs, at runtime so that we know the Openssl functions are working? Basically a data-in integrity test on the random data to test for a broken Openssl implementation. I know we are checking return status but a entropy test on the first block generated would be the ultimate test that the random data is being generated correctly. |
Beta Was this translation helpful? Give feedback.
-
Currently doing some attempts on implementing/rewriting the entropy stuff. This is a tough one, because i think it wasn't intended to be changed ever. |
Beta Was this translation helpful? Give feedback.
-
Ahoy folks. Today i had an issue with a bugged kernel in fedora, which caused
/dev/urandom
to provide bad entropy below 5.Now after kernel update, it has been fixed.
But in my opinion we have to consider this case for nwipe as well.
I'd implement using OpenSSL a second entropy source using OpenSSL secure seed function.
Also another 3rd source might be RDSEED.
Afterwards i would compare the entropies with a function, and use the best source, or only other source than
/dev/urandom
if it's entropy is trash.What are your thoughts on this?
BR,
Beta Was this translation helpful? Give feedback.
All reactions