I have been looking at doing somrhing similar because I have a usb
wlan that for some reason unplugs it self (the device seems to die, I
think it's broken or something).
I will try this diff when I get a chance.
BR
Dunceor
On Thu, Dec 23, 2010 at 1:36 AM, Jacob Meuser
wrote:
> no feedback yet. B
Bad AML. Looks like it is trying to do an AML Load of a memory block, and that
is failing.
Usually that's because the checksum is incorrect. Look at dsdt.c:aml_load()
and put printf's at both goto fails', to see what is failing.
Not much I can do about it now as I am in Palau. :)
-jordan
> Date
On 12/22/2010 03:49 PM, Clint Pachl wrote:
Salvador Fandiqo wrote:
Could a random seed be patched into the kernel image at installation
time?
Admittedly this is not entropy, this is a just secret key and anyone
with access to the machine would be able to read it,
How is it different than any
If you've never made a dime online before, imagine being able to create a
profit-pulling machine in just 7 clicks of your mouse...
Start Now : http://business-page.us/4997-profit-pulling-software.html
On Thu, Dec 23, 2010 at 12:36:26AM +, Jacob Meuser wrote:
> no feedback yet. anyone care to comment on this?
Sounds good to me. I can get odd things to happen when I unplug
my ural AP, I just haven't had a chance to test this to see if
it helps. I will try. It's Christmas after all. :-).
...
no feedback yet. anyone care to comment on this?
On Thu, Dec 16, 2010 at 12:28:56AM +, Jacob Meuser wrote:
> the following diff tries to make sure that no other processes/threads
> are or will be using the drivers software context when the driver is
> detached.
>
> this diff covers rum(4), r
don't forget to send the amldump
On Wed, Dec 22, 2010 at 04:08:54PM -0500, Kenneth R Westerback wrote:
> Got a new Dell XPS 401 laptop today and booted amd64 -current bsd.mp
> off of a usb stick. It immediately blew up in acpi. bsd.rd did not
> blow up.
>
> There seems to be a minor (i.e. non ddb
On Wed, Dec 22, 2010 at 4:49 PM, Clint Pachl wrote:
> Would it be possible to use what randomness the system does have to seed
> some reader that pseudo-randomly reads arbitrary bits from the loaded kernel
> image in RAM?
>
> This may differ per system, but doesn't uninitialized RAM start in an
>
Salvador Fandiqo wrote:
On 12/22/2010 01:46 AM, Theo de Raadt wrote:
2010/12/21 Theo de Raadt:
HANG ON.
Go look at the function random_seed() in /usr/src/etc/rc
Then look at when it is called.
so, the current state of the PRNG will be preserved during reboots.
That statement is false.
Go
On Wed, Dec 22, 2010 at 12:24 PM, Marsh Ray wrote:
> On 12/22/2010 11:44 AM, Kjell Wooding wrote:
>
>> Can you please stop wasting time asking questions before you bother to
>> read
>> about what you are asking?
>>
>
> Consider the possibility that I have, in fact, read a little bit about it
> and
Got a new Dell XPS 401 laptop today and booted amd64 -current bsd.mp
off of a usb stick. It immediately blew up in acpi. bsd.rd did not
blow up.
There seems to be a minor (i.e. non ddb> causing) issue prior to
acpivideo:
acpiec0 at acpi0
acpicpu0 at acpi0acpi0: unable to load \\_PR_.CSDT
: PSS
ac
On Wed, 22 Dec 2010 09:03:57 +0100
Henning Brauer wrote:
> * Thomas Pfaff [2010-12-21 22:19]:
[...]
> > 2) pf.conf(5) says "set debug" can be one of loud, misc, none, or urgent
> > but if you "set debug loud" in pf.conf and load it the pfctl -sa output
> > will say "Debug: debug", or if you "set
> Which is why I'm wondering what exactly, this 'multi-consumer' design
> feature is all about. Is it simply that more userland stuff is pinging
> the kernel at unpredictable times resulting in more timestamps feeding
> into the central entropy pool? It seems like you could accomplish that
> wi
On 12/22/2010 01:42 PM, Ted Unangst wrote:
This distinguisher works by looking at the probability of pairs of bytes
being repeated (2 to 5 times) within a certain number of rounds (having a
gap 'g' between them). Fig 3 shows their results for gaps from 0 to 60. It
looks like the data collection
On Wed, Dec 22, 2010 at 10:44:48AM -0700, Kjell Wooding wrote:
> Oh good grief. Yes, ARC4 is being used to stretch a random source. Feel free
> to hunt for the distinguisher in the OpenBSD multi-consumer model. There's a
> good paper in there. If you can show a distinguisher (even without
> reseedi
On Wed, Dec 22, 2010 at 2:24 PM, Marsh Ray wrote:
> This one does it in 2^26 bytes:
> http://www.iacr.org/cryptodb/data/paper.php?pubkey=2597
>
> Let's see, (libc)arc4random.c says:
>> arc4_count = 160;
>
> That's about 2^20 so you'd get 41 reseedings generating that much input
> data. But
On 12/22/2010 11:44 AM, Kjell Wooding wrote:
Can you please stop wasting time asking questions before you bother to read
about what you are asking?
Consider the possibility that I have, in fact, read a little bit about
it and am asking some of these questions because I suspect you don't
actua
Can you please stop wasting time asking questions before you bother to read
about what you are asking?
On Wed, Dec 22, 2010 at 10:00 AM, Marsh Ray wrote:
> How is this different, except for perhaps the intermediate arc4 cipher.
> What does that add, other than crappiness? (RC4 is known to be
> di
On 12/22/2010 09:29 AM, Kurt Knochner wrote:
Do you have a hint, how I could emit the random values from arc4random
in a "clever" way? I thought of using an internal buffer and accessing
that through sysctl or another device, e.g. /dev/randstream.
You should definitely check out this page if y
On Wed, 22 Dec 2010 11:00:43 -0600
Marsh Ray wrote:
> But a typical box doesn't have "hundreds and hundreds" of processes or
> unpredictable event sources. There are 300 or so references in the
> source tree, but most of them are in code that doesn't run on any given
> machine.
>
> A special-
On 12/22/2010 06:57 AM, Kevin Chadwick wrote:
On Wed, 22 Dec 2010 05:08:56 -0600
Marsh Ray wrote:
Let's say I could sample the output of the RNG in every process and from
every network device in the system. As much as I wanted. How could I
tell the difference between "one prng per purpose" and
Daca aveti probleme cu vizionarea acestui email dati [click aici] pentru
a vizualiza varianta online!
[IMAGE]
[IMAGE]
Newsletter 21.12.2010
[IMAGE]
CaseFaraIntermediari.roUrmariti-ne pe Facebook!Urmariti-ne pe
Twitter!Urmariti-ne pe Blogger!
Ultimele anunturi adaugate
Vezi toate anunturil
-Original Message-
From: owner-t...@openbsd.org [mailto:owner-t...@openbsd.org] On Behalf Of
Joachim Schipper
Subject: Re: Allegations regarding OpenBSD IPSEC
> On Wed, Dec 22, 2010 at 04:29:59PM +0100, Kurt Knochner wrote:
>
> >
> > Do you have a hint, how I could emit the random values f
On Wed, Dec 22, 2010 at 09:51:22AM -0500, Lawrence Teo wrote:
> The keynote.{1,3,4,5} man pages reference a paper entitled
> "Decentralized Trust Management" by M. Blaze, J. Feigenbaum, and J.
> Lacy, but the name of the conference is incorrect.
>
> That paper was presented at the IEEE Symposium o
On Tue, Dec 21, 2010 at 02:22:37PM +0100, Jiri B. wrote:
> On Mon, Nov 29, 2010 at 02:22:35PM -0800, Chris Kuethe wrote:
> >Currently bioctl invokes readpassphrase(3) with RPP_REQUIRE_TTY, which
> >means that there must be a controlling tty to read the password from.
> >This diff adds an option (-s
On Wed, Dec 22, 2010 at 04:29:59PM +0100, Kurt Knochner wrote:
> 2010/12/22 Theo de Raadt :
> > Go ahead, do a FIPS check on it. You will be doing a FIPS check on
> > 4096 bytes here, then a gap of unknown length, then 4096 bytes here,
> > then a gap of unknown length, then 4096 bytes here, then a
2010/12/22 Theo de Raadt :
> Go ahead, do a FIPS check on it. You will be doing a FIPS check on
> 4096 bytes here, then a gap of unknown length, then 4096 bytes here,
> then a gap of unknown length, then 4096 bytes here, then a gap of
> unknown length,
that's true, if one uses just /dev/aran
The keynote.{1,3,4,5} man pages reference a paper entitled
"Decentralized Trust Management" by M. Blaze, J. Feigenbaum, and J.
Lacy, but the name of the conference is incorrect.
That paper was presented at the IEEE Symposium on Security and
Privacy [1, 2], and not the "IEEE Conference on Privacy a
On Wed, 22 Dec 2010 05:08:56 -0600
Marsh Ray wrote:
> Let's say I could sample the output of the RNG in every process and from
> every network device in the system. As much as I wanted. How could I
> tell the difference between "one prng per purpose" and "data-slicing one
> prng with all consu
On 12/21/2010 09:26 PM, Theo de Raadt wrote:
Wow. You really are not reading the same code, are you.
Haha, yeah I have been reading all over the map. My comments are
out-of-order too.
BTW, the nanotime in arc4_stir looks like it's redundant anyway since
get_random_bytes calls extract_entro
On Wed, Dec 22, 2010 at 11:58:50AM +0001, Jason McIntyre wrote:
> On Tue, Dec 21, 2010 at 02:22:37PM +0100, Jiri B. wrote:
> > On Mon, Nov 29, 2010 at 02:22:35PM -0800, Chris Kuethe wrote:
> > >Currently bioctl invokes readpassphrase(3) with RPP_REQUIRE_TTY, which
> > >means that there must be a co
On Tue, Dec 21, 2010 at 02:22:37PM +0100, Jiri B. wrote:
> On Mon, Nov 29, 2010 at 02:22:35PM -0800, Chris Kuethe wrote:
> >Currently bioctl invokes readpassphrase(3) with RPP_REQUIRE_TTY, which
> >means that there must be a controlling tty to read the password from.
> >This diff adds an option (-s
On 12/22/2010 01:46 AM, Theo de Raadt wrote:
2010/12/21 Theo de Raadt:
HANG ON.
Go look at the function random_seed() in /usr/src/etc/rc
Then look at when it is called.
so, the current state of the PRNG will be preserved during reboots.
That statement is false.
Good.
No. You misread th
As noted by Peter Miller, the fsck and mount procedures in bsd.rd
differ from /etc/rc. Specifically, he had issues with usb disks that
were not always present at boot. While /etc/rc would not fsck
those (since fs_passno == 0) and ignore any issues with mount -a,
the upgrade process was a bit more p
On Wed, Dec 22, 2010 at 08:28:51AM +0300, Vadim Zhukov wrote:
> On 21 December 2010 G. 22:59:22 Theo de Raadt wrote:
> > Go look at the function random_seed() in /usr/src/etc/rc
>
> And it's definitely worth looking... Patch below.
Believe it or not, but this diff has been circling around develo
On Tue, Dec 21, 2010 at 07:45:09PM +0100, Kurt Knochner wrote:
> The in libc the rc4 state is only initialized once at the first call of
> arc4_stir() and then there are consecutive calls to arc4_addrandom() which
> is the equivalent of rc4_crypt(). So, there is a difference in the
> implementatio
eh3e-8e!eig(g62h7/eh3f4e$ig(eh3d;#g"http://elearn.airnet.com.tw/%E5%9C%98%E8%B3%BC%E8%AA%B2%E7%A8%8B-12-31/>
| ef6h(i1o<
http://edm.01-10.com/lists/?p=unsubscribe&uid=579765d5c0ff9a136cbf4f5badb25cb6
| f4f0h(-e.o<
http://edm.01-10.com/lists/?p=preferences&uid=579765d5c
* Thomas Pfaff [2010-12-21 22:19]:
> A few things that has me confused ...
>
> 1) pf(4) says DIOCSETDEBUG has enum { PF_DEBUG_NONE, PF_DEBUG_URGENT, ...
> but these names are not in pfvar.h nor anywhere else in the source tree
> (AFAICT). What should the legal values (or names) be?
>
> 2) pf.co
38 matches
Mail list logo