[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10676 [Tor]: Verify urandom-style RNG is seeded before generating ID keys



#10676: Verify urandom-style RNG is seeded before generating ID keys
-----------------------------+--------------------------------------------
     Reporter:  nickm        |      Owner:
         Type:  enhancement  |     Status:  needs_review
     Priority:  major        |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-server rng urandom startup
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+--------------------------------------------

Comment (by user101):

 I think this relates to cypherpunks comment above and I don't have any
 references of my own handy, but it is not sufficient for /dev/random to
 *think* it has or has had entropy.  It has been shown that the "entropy"
 generated at bootup by many small, diskless  devices such as consumer
 grade "wireless routers" will tend to be similar between identical units,
 likely contributing to the problems noted in the factorable.net link in
 cyperpunks post.  This is related to, but not identical with, the problems
 noted in the Linux man page for /dev/random leading to the recommendation
 to carry entropy over across boots.  So somehow on these "limited entropy
 devices" you need to wait long enough for *real* entropy to be generated
 that will be sufficiently different from the "entropy" generated on other
 like devices.  /dev/random will *think* it has entropy long before this.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10676#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs