[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #31967 [Circumvention/BridgeDB]: BridgeDB Server uses insecure pseudorandom generator for selecting cached captcha



#31967: BridgeDB Server uses insecure pseudorandom generator for selecting cached
captcha
-------------------------------+----------------------------------------
 Reporter:  willbarr           |          Owner:  (none)
     Type:  defect             |         Status:  new
 Priority:  Medium             |      Component:  Circumvention/BridgeDB
  Version:  sbws: unspecified  |       Severity:  Normal
 Keywords:                     |  Actual Points:
Parent ID:                     |         Points:
 Reviewer:                     |        Sponsor:
-------------------------------+----------------------------------------
 https://gitweb.torproject.org/bridgedb.git/tree/bridgedb/captcha.py#n389

 From python documentation: The pseudo-random generators of this module
 (random) should not be used for security purposes.

 It should use the secrets module `secrets.choice()` or if you plan to keep
 python2 compatibility `random.SystemRandom.choice()`.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31967>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs