[tor-bugs] #10676 [Tor]: Verify urandom-style RNG is seeded before generating ID keys
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jan 20 18:50:04 UTC 2014
#10676: Verify urandom-style RNG is seeded before generating ID keys
-----------------------------+--------------------------------------------
Reporter: nickm | Owner:
Type: enhancement | Status: new
Priority: major | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-server rng urandom startup
Actual Points: | Parent ID:
Points: |
-----------------------------+--------------------------------------------
Comment (by nickm):
I have an implementation of (1) in my branch "feature_10676". It needs
review.
I'm hoping to do (2) as well, since the "whenever we create a datadir"
thing won't actually work.
>Keeping a bit of randomness in the datadirectory is also fine with me if
we actually think there are platforms out there with crummy entropy.
Historically, the issue isn't likely to be crummy platforms, but crummy
platform/installation combinations. Mainline Linux distributions on
regular servers will probably not be too bad, for example... but Linuxes
running on small flash-only devices will need all the help they can get.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10676#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list