[tor-bugs] #11351 [Tor]: Make sandbox code work with chutney, strong enough to be plausible

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Apr 16 01:53:09 UTC 2014


#11351: Make sandbox code work with chutney, strong enough to be plausible
------------------------+--------------------------------
     Reporter:  nickm   |      Owner:
         Type:  defect  |     Status:  needs_review
     Priority:  normal  |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  025-triaged
Actual Points:          |  Parent ID:
       Points:          |
------------------------+--------------------------------

Comment (by nickm):

 Indeed.  It's the call from evutil_secure_rng_init to sysctl() to make the
 stupid internal RNG get set up.  This is apparently happening because
 opening /dev/urandom isn't working, because the libevent I have is
 current, and therefore doesn't have
 evutil_set_secure_random_device_file().

 I think I need a work around... Seeding by hand might work.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11351#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list