[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu
- From: coderman <coderman@xxxxxxxxx>
- Date: Thu, 20 Aug 2009 18:27:48 -0700
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 20 Aug 2009 21:34:08 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=F8UvpYiHNDpwXTBz2A4sJjjiwCSVY7dwAGVi63dWzLU=; b=Mw0vvlIIPrDRrpT1QvLNvYF56ZDyRdLvSyG/9IEzZAC3iPDtzcoE34+1DSZ8lkalp0 fSw9KAkh2m9LE1L+wBJ4nYt0P/+H//6ZTvvOvLnj5fbupVAMeDZb+uu8qDswrPg/dxsA rSEmTqTEABsPong3u90EJuiPRYdlFnAuS34QQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=GJ5elEFQhWkUo64WMUDKWQPI74HQSLTAVsyjH517DG0L+Ir9sFNrRlU7Zf/TYMpB6p bcDrJLFciyNk2SIKKbNACAntYXkomEoDQyI+FjvhdCmZa+RTAz1BOZ89amoY8Vjz++Uv FHRGOaUNnCVIFmfl3rKnHwC2abR0Rr4n5CuCs=
- In-reply-to: <208412.82473.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- References: <4A8B97D7.8010502@xxxxxxxxx> <208412.82473.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Thu, Aug 20, 2009 at 9:05 AM, Curious
Kid<letsshareinformation@xxxxxxxxx> wrote:
> ..
> How is entropy gathered in virtual machines? Will it tell you if there is not enough entropy to support unpredictable routing and encryption? (Or is that even an issue at all with Tor?)
hi Curious,
entropy in virtual machines can be a serious problem. (see "Cloud
computing needs more chaos"). this can be mitigated by passing entropy
into the VM and keeping seed state persisted on virtual disk between
runtime instances. further improvement would entail an entropy daemon
like rngd inside the guest VM receiving entropy from the host.
Tor VM does persist the /dev/random seed state on virtual disk and
also hashes the kernel command line passed to the VM for mixing into
guest entropy pool. this has less entropy than would be desired,
however.
i have created a new flyspray to improve this further:
http://bugs.noreply.org/flyspray/index.php?do=details&id=1067
best regards,