Date: Fri, 21 Aug 2015 12:58:11 +1000 From: Michael Samuel <mik@...net.net> To: oss-security@...ts.openwall.com Subject: Re: CVE for crypto_get_random() from libsrtp Hi, On 11 August 2015 at 17:51, Adam Maris <amaris@...hat.com> wrote: > The weakest method it provides uses no encryption at all, just HMAC-SHA1 > with 80 bit authentication tag: > > http://srtp.sourcearchive.com/documentation/1.4.2.dfsg/group__SRTP_g94d0056e812802ac2920aa474bc5b59b.html > > That's only for SRTP packets - the PRNG itself seems not obviously broken (again - unless it's used by multiple threads). Regards, Michael
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ