Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 15 Jun 2015 20:26:32 +0200
From: Bastian Blank <waldi@...ian.org>
To: Pierre Schweitzer <pierre@...ctos.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: PostgreSQL - Predictable cancel key

Hi Pierre

On Mon, Jun 15, 2015 at 10:32:37AM +0200, Pierre Schweitzer wrote:
> I had a look at glibc random implementation, they got rid of the old
> LCG they were using for a "nonlinear additive feedback" PRNG which
> uses a 31 numbers state. That means that knowing a number in the
> pseudo-random stream you cannot recover the whole generator state to
> compute the next PRN, as it was possible with a LCG.

> So, basically, if I'm right (correct otherwise!) knowing your cancel
> key and your PID makes it really hard to know which key belongs to
> other PIDs. Because you still lack two pieces of information: the
> initial state (deduced from the knowledge of the seed) and the state
> of the generator when it generated your key (or perhaps knowing just
> one state would be enough? Anyway, it's missing).

The seed is not public, but you missed one detail: there are only one
million different ones.  This seed is the only input of the PRNG.  With
one million starting points (which is a lot less then the complete
state) you can easily brute force the seed for the returned values.
After you know the complete state, you can calculate possible state
ranges for different PID.

Bastian

-- 
The sight of death frightens them [Earthers].
		-- Kras the Klingon, "Friday's Child", stardate 3497.2

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ