[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #31967 [Circumvention/BridgeDB]: BridgeDB Server uses insecure pseudorandom generator for selecting cached captcha
#31967: BridgeDB Server uses insecure pseudorandom generator for selecting cached
captcha
-------------------------------+----------------------------------------
Reporter: willbarr | Owner: (none)
Type: defect | Status: new
Priority: Medium | Component: Circumvention/BridgeDB
Version: sbws: unspecified | Severity: Normal
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------+----------------------------------------
https://gitweb.torproject.org/bridgedb.git/tree/bridgedb/captcha.py#n389
From python documentation: The pseudo-random generators of this module
(random) should not be used for security purposes.
It should use the secrets module `secrets.choice()` or if you plan to keep
python2 compatibility `random.SystemRandom.choice()`.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31967>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs