From owner-doc-jp@jp.freebsd.org  Tue Jul  4 02:42:11 2000
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id CAA07645;
	Tue, 4 Jul 2000 02:42:11 +0900 (JST)
	(envelope-from owner-doc-jp@jp.FreeBSD.org)
Received: from bf.mbn.or.jp (bf.mbn.or.jp [202.217.0.48])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id CAA07640
	for <doc-jp@jp.FreeBSD.ORG>; Tue, 4 Jul 2000 02:42:10 +0900 (JST)
	(envelope-from ykondo@bf.mbn.or.jp)
Received: from mebius (cse5-27.nishinomiya.mbn.or.jp [210.144.164.143])
	by bf.mbn.or.jp (8.9.1/bf.mbn.or.jp-2.0) with SMTP id CAA18514
	for <doc-jp@jp.FreeBSD.ORG>; Tue, 4 Jul 2000 02:42:08 +0900 (JST)
Message-ID: <014f01bfe516$105dfee0$c1a490d2@mebius>
From: "Yoshinori Kondo" <ykondo@bf.mbn.or.jp>
To: "doc-jp" <doc-jp@jp.FreeBSD.ORG>
Date: Tue, 4 Jul 2000 02:37:57 +0900
Organization: 
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-2022-jp"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Reply-To: doc-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: doc-jp 7502
Subject: [doc-jp 7502] Re: ANNOUNCE: FreeBSD Security Advisory:FreeBSD-SA-00:25.alpha-dev-random
Errors-To: owner-doc-jp@jp.freebsd.org
Sender: owner-doc-jp@jp.freebsd.org
X-Originator: ykondo@bf.mbn.or.jp

$B$D$$@h7n(Bsubscribe$B$7$?<T$G$9!#(B $BK]Lu$NN.$l$,J,$+$C$F$$$^$;$s$,!"(B"$B%V%i%C%7%e(B
$B%"%C%W$7$F2<$5$$(B"$B$H8@$&$3$H$G!"5$$K$J$C$?$H$3$m$@$1=P$7$?$$$H;W$$$^$7$F!#(B

  $B$I$3$^$G%V%i%C%7%e%"%C%W$9$k$+$H8@$&$3$H$,$"$k$H;W$$$^$9$,!"@5$7$/!"$o$+$j(B
$B$d$9$/86J8$N0U?^$rI=8=$7$F$$$l$P5;=QK]Lu$H$7$F$ONI$$$N$G$O$H;W$C$F$$$^$9!#(B
($B7h$7$FF|K\8l$H$7$FIT<+A3$H8@$&$3$H$r$$$C$F$$$k$o$1$G$O$"$j$^$;$s$N$G(B(^^)$B!#(B
$BF|K\8l$H$7$F$bLdBj$J$$$H;W$$$^$9!#(B)

$BI=8=J}K!$b=i$a$F$J$N$G<+8JN.$K=q$-49$($?$$ItJ,$r(B()$B$G0O$_!"(B//$B$GDI2CItJ,$r<($7(B
$B$^$7$?!#(B  $B$3$l$i$NJ}K!$b=y!9$K21$($k$+!"$4;XF3$$$?$@$-$?$$$H;W$$$^$9!#(B

$B;d$,5$$K$J$C$?%Q%i%0%i%U$@$1$r;D$7$^$7$?!#(B

$B$3$NCf$G(Boversight$B$H(Bomission$B$r!V%_%9!W$HLu$5$l$F$$$^$9$,!"(B $BLu8l$H$7$F<1JL$7$?(B
$BJ}$,$$$$$+$I$&$+!"Lu<T$N0U?^$rB:=E$7$?$$$H;W$$$^$9$,!";d$N0U8+$O<1JL$7$?J}$,(B
$B$$$$!"$G$9!#(B  $B$$$+$+$G$7$g$&$+!#(B
$B$3$s$I$&$h$7$N$j(B

>
> $B$I$J$?$+%V%i%C%7%e%"%C%W$7$F$/$@$5$$(B (^^;;;

$BCY$/$J$j$^$7$?$,!"$O$;$Y$5$s$H:4F#$5$s$N=$@50F$rE,Ev$K:NMQ$7$F!"<+J,$J(B
$B$j$K%V%i%C%7%e%"%C%W$7$^$7$?!#$@$$$V$3$J$l$F$-$?$+$J!#(B

$B!t;D$k$O!"(BFreeBSD-SA-00:23 $B$@!#(B

BEGIN------------------- $B$3$3$+$i(B ------------------------
 $B$3$N%a!<%k$O(B, announce-jp $B$KN.$l$?(B

  Subject: ANNOUNCE: FreeBSD Security Advisory:
FreeBSD-SA-00:25.alpha-dev-random
  From: FreeBSD Security Advisories <security-advisories@freebsd.org>
  Date: Mon, 12 Jun 2000 14:51:44 -0700 (PDT)
  Message-Id: <20000612215144.D1A3B37BBF7@hub.freebsd.org>
  X-Sequence: announce-jp 457

 $B$rF|K\8lLu$7$?$b$N$G$9(B.
II.  $BLdBj$N>\:Y(B - Problem Description

The FreeBSD port to the Alpha platform did not provide the /dev/random
or /dev/urandom devices - this was an oversight during the development
process which was not corrected before the Alpha port "became
mainstream". FreeBSD/i386 is not affected.

FreeBSD $B$N(B Alpha $BHG$G$O(B, $B%G%P%$%9(B /dev/random $B$*$h$S(B /dev/urandom $B$,Ds(B
$B6!$5$l$F$$$^$;$s$G$7$?(B. $B$3$l$O(B, $B3+H/%W%m%;%9$K!J$*$1$k%_%9!K(B/$B$*$$$F8+2a$4$5(B
$B$l$F$$$?$b$N(B/$B$G$"$j(B, Alpha
$BHG$,3+H/$N%a%$%s%9%H%j!<%`$K<h$j9~$^$l$k$^$G$K=$@5$5$l$J$$$^$^$G$-$^$7(B
$B$?(B. FreeBSD $B$N(B i386 $BHG$K$O(B(,) $B$3$NLdBj$O$"$j$^$;$s(B.

As a consequence, there is no way for Alpha systems prior to the
correction date to obtain cryptographic-strength random numbers,
unless an application "rolls its own" entropy gathering
mechanism. This in itself is not a vulnerability, although it is an
omission and a departure from the expected behaviour of a FreeBSD
system.

$B$D$^$j(B, $B=$@5F|0JA0$N(B Alpha $BHG(B FreeBSD $B$G$O(B, $B%"%W%j%1!<%7%g%s<+?H$,%(%s(B
$B%H%m%T!<$N@8@.5!9=$r;}$?$J$$8B$j(B, $B0E9f$N@8@.$K;HMQ$G$-$k$h$&$J6/EY$r;}(B
$B$C$?Mp?t$rF@$kJ}K!$,$"$j$^$;$s(B. $B$3$l$O(B($B%_%9(B)/$B5!G=$N>JN,(B/$B$G$"$j(B, FreeBSD $B%7%9(B
$B%F%`$K4|(B
$BBT$5$l$kF0:n(B($B$KH?$7$F(B)/$B$+$iN%$l$F(B/$B$$$^$9$,(B, $B$=$l<+BN$,<eE@$H$J$k$o$1$G$O$"$j(B
$B$^$;$s(B.

The actual vulnerability is that some applications fail to correctly
check for a working /dev/random and do not exit with an error if it is
not available, so this weakness goes undetected. OpenSSL 0.9.4, and
utilities based on it, including OpenSSH (both of which are included
in the base FreeBSD 4.0 system) are affected in this manner (this bug
was corrected in OpenSSL 0.9.5)

$B<B:]$K%;%-%e%j%F%#>e$N<eE@$H$J$k$N$O(B, /dev/random $B$,F/$/$+$I$&$+$r@5$7(B
$B$/3NG'(B($B$7$J$$$G(B)/$B$G$-$:(B/, /dev/random $B$,MxMQ$G$-$J$/$F$b%(%i!<$G=*N;$7$J$$$h(B
$B$&$J(B
$B%"%W%j%1!<%7%g%s$,B8:_$9$k$H$$$&$3$H$G$9(B. $B$=$N>l9g(B, $B$3$N%;%-%e%j%F%#>e(B
$B$N<eE@$O8!=P$5$l$J$$$^$^$K$J$C$F$7$^$$$^$9(B. OpenSSL 0.9.4 $B$H(B, OpenSSL
$B$K4p$E$/(B OpenSSH $B$N$h$&$J%f!<%F%#%j%F%#(B ($B$I$A$i$b(B FreeBSD 4.0 $B$N%Y!<%9(B
$B%7%9%F%`$K4^$^$l$F$$$^$9(B) $B$,$3$N1F6A$r<u$1$^$9(B ($B$3$N%P%0$O(B OpenSSL
0.9.5 $B$G=$@5$5$l$F$$$^$9(B).
NOTE: Because of the significant improvements to the FreeBSD/Alpha
platform in FreeBSD 4.0, it is not planned at this time to backport
the necessary changes to FreeBSD 3.4-STABLE.

$BCm0U(B: Alpha $BHG(B FreeBSD 4.0 $B$G$OBg$-$J(B($BJQ99(B)/$B2~A1(B/$B$,$5$l$F$$$k$?$a(B, FreeBSD
3.4-STABLE $B$K$D$$$FI,MW$J=$@5$r$9$k$3$H$O(B, $B8=;~E@$G$OM=Dj$5$l$F$$$^$;(B
$B$s(B.
----
$B$3$,$h$&$$$A$m$&(B

     $B!&(B. $B!y(B   .   $B!&(B  .  $B!&(B     .  $B!&(B .     $B!&(B .  $B!&(B.  $B!&(B.
         **    .   $B!&(B       $B!;(B    $B!&(B                   $B!&(B.
     $B!&(B ***N   .       $B!&(B $B#o(B    $B!&(B  .      .    $B!&(B    $B!&(B Yoshinori Kondo
     . *i****     $B!&(B  .  o    $B!&(B          $B!&(B         $B!&(B .  $B!&(B
ykondo@bf.mbn.or.jp
      X***J***      $B!2!2'1(B        $B!&!?!@(B $B!?!@(B     $B!&(B   . $B!&(B
     **X*****o*   $B!?!@!!'8!@(B     $B!&!?(B  $B!@(B   $B!@(B  $B!&(B $B'%(B   .
    ******%*****$B!?(B $B!8(B $B!@(B____$B!@(B    $B!?(B    $B!@(B   $B!@(B   (^^)     $B!&(B
    ++++ || ++++|  $B'1(B   | E  |++++   ||.   | +++ C $B!'(B )$B!&(B .
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


