@techreport{sheffer-dhc-initial-random-00, number = {draft-sheffer-dhc-initial-random-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-sheffer-dhc-initial-random/00/}, author = {Yaron Sheffer and Paul E. Hoffman}, title = {{A DHCP Extension To Provide Initial Random Material}}, pagetotal = 8, year = 2013, month = dec, day = 4, abstract = {Some network devices get little or no entropy from their underlying operating systems when they are first started. As a result, cryptographic applications started before there is sufficient entropy in the operating system's pool can be initialized into a state that can be exploited by an attacker. This document defines a DHCP extension that can provide the operating system of a network device with some initial randomness that can only be known by an attacker who is on the same network segment as the device and its DHCP server. The operating system can mix this random input into its random pool early in the boot procedure and thus have more entropy available when cryptographic applications start.}, }