Re: /dev/random5

2014-08-05 Thread Andrew McGlashan
On 4/08/2014 7:51 PM, Joel Rees wrote: > On Mon, Aug 4, 2014 at 3:53 PM, Andrew McGlashan > wrote: >> [...] >> If you do the /dev/zero against a volume, then no useful data will >> remain on that volume ... you need to backup that file system first, >> then restore it after you re-create the file

Re: /dev/random5

2014-08-04 Thread David Christensen
On 08/03/2014 11:53 PM, Andrew McGlashan wrote: On 4/08/2014 5:43 AM, David Christensen wrote: If I know that I will be setting up a GPT partition table with one primary partition for LUKS that uses all available LBA's aligned to 1 MB boundaries, zeroing (/dev/urandom?) the first and last megaby

Re: /dev/random5

2014-08-04 Thread Joel Rees
On Mon, Aug 4, 2014 at 3:53 PM, Andrew McGlashan wrote: > [...] > If you do the /dev/zero against a volume, then no useful data will > remain on that volume ... you need to backup that file system first, > then restore it after you re-create the file system again. Well, that depends on a number o

Re: /dev/random5

2014-08-03 Thread Andrew McGlashan
On 4/08/2014 5:43 AM, David Christensen wrote: > On 08/03/2014 10:45 AM, Andrew McGlashan wrote: >> On 3/08/2014 10:48 PM, B wrote: >>> On Sun, 03 Aug 2014 18:20:19 +1000 >>> I do not agree with that because using only zeros makes >>> the result part predictable for the attacker: >> Yes, but th

Re: /dev/random5

2014-08-03 Thread David Christensen
On 08/03/2014 10:45 AM, Andrew McGlashan wrote: On 3/08/2014 10:48 PM, B wrote: On Sun, 03 Aug 2014 18:20:19 +1000 I do not agree with that because using only zeros makes the result part predictable for the attacker: Yes, but the method of encryption used (aes-xts-plain64) does NOT lend its

Re: /dev/random5

2014-08-03 Thread Andrew McGlashan
On 4/08/2014 4:19 AM, B wrote: > On Mon, 04 Aug 2014 03:45:48 +1000 > Andrew McGlashan wrote: > >> Yes, but the method of encryption used (aes-xts-plain64) does NOT >> lend itself to this kind of analysis. > > Not that we know of… Yes. > XTS doesn't seem to be a right choice: > http://sock

Re: /dev/random5

2014-08-03 Thread Bzzzz
On Mon, 04 Aug 2014 03:45:48 +1000 Andrew McGlashan wrote: > Yes, but the method of encryption used (aes-xts-plain64) does NOT > lend itself to this kind of analysis. Not that we know of… XTS doesn't seem to be a right choice: http://sockpuppet.org/blog/2014/04/30/you-dont-want-xts/ > btw aes-

Re: /dev/random5

2014-08-03 Thread Andrew McGlashan
On 3/08/2014 10:48 PM, B wrote: > On Sun, 03 Aug 2014 18:20:19 +1000 > I do not agree with that because using only zeros makes > the result part predictable for the attacker: if he knows > what you wrote, he has a (very) large part of the > cryptanalysis done… > This is 1.0.1 of cryptanalysis:

Re: /dev/random5

2014-08-03 Thread Bzzzz
On Sun, 03 Aug 2014 18:20:19 +1000 Andrew McGlashan wrote: > After you have formatted your volume, but before you start using > it, you use dd to write /dev/zero to the entire volume -- due to > the encryption process, those zeros will be just random data based > on the key, it should be quicker

Re: /dev/random5

2014-08-03 Thread Andrew McGlashan
On 3/08/2014 12:31 PM, David Christensen wrote: > On 08/02/2014 12:16 PM, Joel Rees wrote: >> As I understand it, he's asking whether any of us on the users list has >> anaylyzed the output of both /dev/random and /dev/urandom . Not just >> whether any of us are having issues with blocking, but wi

Re: /dev/random5

2014-08-02 Thread David Christensen
On 08/02/2014 12:16 PM, Joel Rees wrote: As I understand it, he's asking whether any of us on the users list has anaylyzed the output of both /dev/random and /dev/urandom . Not just whether any of us are having issues with blocking, but with the randomness as well. Another metric is throughput

Re: /dev/random5

2014-08-02 Thread Zenaan Harkness
On 8/3/14, Joel Rees wrote: > And it occurs to me in the morning that I forgot to explain Paul's > question. > > As I understand it, he's asking whether any of us on the users list has > anaylyzed the output of both /dev/random and /dev/urandom . Not just > whether any of us are having issues wi

Re: /dev/random5

2014-08-02 Thread Joel Rees
2014/08/02 11:01 "Joel Rees" : > > (For Lisi and Bob and others ;-/) > > [...] > Now, the random typing is not necessary. And it occurs to me in the morning that I forgot to explain Paul's question. As I understand it, he's asking whether any of us on the users list has anaylyzed the output of bo