[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10676 [Tor]: Verify urandom-style RNG is seeded before generating ID keys



#10676: Verify urandom-style RNG is seeded before generating ID keys
-----------------------------+--------------------------------------------
     Reporter:  nickm        |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  major        |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-server rng urandom startup
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+--------------------------------------------

Comment (by nickm):

 I have an implementation of (1) in my branch "feature_10676".  It needs
 review.

 I'm hoping to do (2) as well, since the "whenever we create a datadir"
 thing won't actually work.

 >Keeping a bit of randomness in the datadirectory is also fine with me if
 we actually think there are platforms out there with crummy entropy.

 Historically, the issue isn't likely to be crummy platforms, but crummy
 platform/installation combinations.  Mainline Linux distributions on
 regular servers will probably not be too bad, for example... but Linuxes
 running on small flash-only devices will need all the help they can get.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10676#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs