Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 21 Aug 2015 12:58:11 +1000
From: Michael Samuel <mik@...net.net>
To: oss-security@...ts.openwall.com
Subject: Re: CVE for crypto_get_random() from libsrtp

Hi,

On 11 August 2015 at 17:51, Adam Maris <amaris@...hat.com> wrote:

> The weakest method it provides uses no encryption at all, just HMAC-SHA1
> with 80 bit authentication tag:
>
> http://srtp.sourcearchive.com/documentation/1.4.2.dfsg/group__SRTP_g94d0056e812802ac2920aa474bc5b59b.html
>
>
That's only for SRTP packets - the PRNG itself seems not obviously broken
(again - unless it's used by multiple threads).

Regards,
  Michael

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ