[tor-bugs] #10676 [Tor]: Verify urandom-style RNG is seeded before generating ID keys

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jan 20 18:50:04 UTC 2014


#10676: Verify urandom-style RNG is seeded before generating ID keys
-----------------------------+--------------------------------------------
     Reporter:  nickm        |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  major        |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-server rng urandom startup
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+--------------------------------------------

Comment (by nickm):

 I have an implementation of (1) in my branch "feature_10676".  It needs
 review.

 I'm hoping to do (2) as well, since the "whenever we create a datadir"
 thing won't actually work.

 >Keeping a bit of randomness in the datadirectory is also fine with me if
 we actually think there are platforms out there with crummy entropy.

 Historically, the issue isn't likely to be crummy platforms, but crummy
 platform/installation combinations.  Mainline Linux distributions on
 regular servers will probably not be too bad, for example... but Linuxes
 running on small flash-only devices will need all the help they can get.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10676#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list