[tor-bugs] #11351 [Tor]: Make sandbox code work with chutney, strong enough to be plausible
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Apr 16 01:53:09 UTC 2014
#11351: Make sandbox code work with chutney, strong enough to be plausible
------------------------+--------------------------------
Reporter: nickm | Owner:
Type: defect | Status: needs_review
Priority: normal | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Resolution: | Keywords: 025-triaged
Actual Points: | Parent ID:
Points: |
------------------------+--------------------------------
Comment (by nickm):
Indeed. It's the call from evutil_secure_rng_init to sysctl() to make the
stupid internal RNG get set up. This is apparently happening because
opening /dev/urandom isn't working, because the libevent I have is
current, and therefore doesn't have
evutil_set_secure_random_device_file().
I think I need a work around... Seeding by hand might work.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11351#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list