[tor-bugs] #10676 [Tor]: Verify urandom-style RNG is seeded before generating ID keys

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Mar 5 18:20:39 UTC 2014


#10676: Verify urandom-style RNG is seeded before generating ID keys
-----------------------------+--------------------------------------------
     Reporter:  nickm        |      Owner:
         Type:  enhancement  |     Status:  needs_revision
     Priority:  major        |  Milestone:  Tor: 0.2.6.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-server rng urandom startup
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+--------------------------------------------
Changes (by nickm):

 * status:  needs_review => needs_revision
 * milestone:  Tor: 0.2.5.x-final => Tor: 0.2.6.x-final


Comment:

 >I think this relates to cypherpunks comment above and I don't have any
 references of my own handy, but it is not sufficient for /dev/random to
 *think* it has or has had entropy.

 Right; the point of this patch series is not to try for a user-space
 solution to all possible or historical kernel breakage.  Instead, I'm
 trying to improve our behavior in the presence of the kinds of kernel
 breakage where /dev/urandom does not yet have sufficient entropy, and the
 kernel knows it doesn't, but returns data anyway.

 Still, this isn't on-deadline for 0.2.5.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10676#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list