[tor-bugs] #23086 [Obfuscation/BridgeDB]: GIMP Captcha uses insecure random number generator
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Aug 8 09:35:38 UTC 2017
#23086: GIMP Captcha uses insecure random number generator
----------------------------------+--------------------------
Reporter: cypherpunks | Owner: isis
Type: defect | Status: reopened
Priority: Medium | Milestone:
Component: Obfuscation/BridgeDB | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
----------------------------------+--------------------------
Changes (by cypherpunks):
* status: closed => reopened
* resolution: not a bug =>
Comment:
1)
You don't use /dev/urandom in your captcha generation. You use ordinary
random. I don't know if GIMP functions internals use CSPRNG, but I think
they neither do.
>Almost all module functions depend on the basic function random(), which
generates a random float uniformly in the semi-open range [0.0, 1.0).
Python uses the Mersenne Twister as the core generator.
MT is insecure.
>2) There's no need for a CSPRNG when randomly munging pixels.
If the bias in the distribution the captcha parameters is exploitable (it
is if the PRNG is not secure) there are odds to solve the captcha (with or
without OCR) non-negligible better than if it was truly random. You are a
cryptologist, you should understand that.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23086#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list