[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NEW Netscape RNG hole



[I sent this to the wrong address last week. A side effect seems to that
I now I have an anonymous ID.]

RingZero wrote:

> However, Netscape had not revealed enough information about
> their RNG to allow myself or other reviewers to determine how
> critical it was. If, for example, this seeding function were
> called once every time a secure connection were established,
> losing a handle would be a major problem.

Yes. The README was not as explicit on this point as my original
message. SEC_SystemInfoForRNG is indeed among the global initialization
routines.

> This seems like a good reason to ask for the code for
> SEC_RandomUpdate().

As was stated in the README, I cannot publish that code. It's derived
from (and remarkably similar to) code that Netscape has licensed. It's
not ours to divulge.

> You show us from what sources you gather bits,
> but you don't show us how you mix them or, for that matter,
> stream out "random" bits.

There seems to be little point in extracting isolated lines of
code out of the source to "prove" that we use the functions we
claim to use. If you have familiarity with RSAREF or the BSAFE
toolkit, you will be able to see how we mix and extract the
"random" bits.

PK
--
Philip L. Karlton			[email protected]
Principal Curmudgeon			http://www.netscape.com/people/karlton
Netscape Communications Corporation