[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10676 [Tor]: Verify urandom-style RNG is seeded before generating ID keys
#10676: Verify urandom-style RNG is seeded before generating ID keys
-----------------------------+--------------------------------------------
Reporter: nickm | Owner:
Type: enhancement | Status: new
Priority: major | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-server rng urandom startup
Actual Points: | Parent ID:
Points: |
-----------------------------+--------------------------------------------
Comment (by nickm):
I have an implementation of (1) in my branch "feature_10676". It needs
review.
I'm hoping to do (2) as well, since the "whenever we create a datadir"
thing won't actually work.
>Keeping a bit of randomness in the datadirectory is also fine with me if
we actually think there are platforms out there with crummy entropy.
Historically, the issue isn't likely to be crummy platforms, but crummy
platform/installation combinations. Mainline Linux distributions on
regular servers will probably not be too bad, for example... but Linuxes
running on small flash-only devices will need all the help they can get.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10676#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs