===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/crypto.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -r1.13 -r1.14
--- www/crypto.html 1998/02/23 21:46:03 1.13
+++ www/crypto.html 1998/02/24 00:26:51 1.14
@@ -72,12 +72,18 @@
So far random numbers are used in the following places
-- ports of a bound socket,
-
- PIDs of processes,
-
- RPC transaction IDs,
-
- DNS Query-IDs,
-
- inode generation numbers and
-
- password salts.
+
- Dynamic sin_port allocation in bind(2).
+
- PIDs of processes.
+
- RPC transaction IDs (XID).
+
- NFS RPC transaction IDs (XID).
+
- DNS Query-IDs.
+
- Inode generation numbers, see getfh(2) and fsirand(8).
+
- Timing perturbance in traceroute(1).
+
- Stronger temporary names for mktemp(3) and mkstemp(3)
+
- Randomness added to the TCP ISS value for protection against
+ spoofing attacks.
+
- To generate salts for the various password algorithms.
+
- For generating fake S/Key challenges.
@@ -94,10 +100,12 @@
In OpenBSD MD5, SHA1, and RIPEMD-160 are used as Cryptographic Hash Functions,
e.g.
@@ -111,11 +119,11 @@
OpenBSD provides transforms like DES and Blowfish for the kernel and userland
programs, which are used in many places like
-- in libc for creating Blowfish passwords,
-
- in IPSec
- to provide confidentiality for the network layer,
-
- in kerberized telnet,
-
- in Photuris to protect the exchanged packet content.
+
- In libc for creating Blowfish passwords.
+
- In IPSec
+ to provide confidentiality for the network layer.
+
- In kerberized telnet.
+
- In Photuris to protect the exchanged packet content.
@@ -123,7 +131,7 @@
www@openbsd.org
-$OpenBSD: crypto.html,v 1.13 1998/02/23 21:46:03 deraadt Exp $
+$OpenBSD: crypto.html,v 1.14 1998/02/24 00:26:51 deraadt Exp $