-
Notifications
You must be signed in to change notification settings - Fork 708
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify /dev/urandom
has been seeded before using it.
#558
Comments
Ring only uses Can't you do this yourself? |
@DemiMarie I recommend people disable the default dev_urandom_fallback feature, which has the same effect with less code. |
/dev/urandom
has been seeded before using it.
I generalized the title of this issue so that it doesn't presume a particular implementation strategy. I agree that it is worth doing something here.
I wish this worked better. In practice it is pretty hard to disable the dev_urandom_fallback feature because any crate that forgets to do so will implicitly enable it. :( |
There are many ways we could go about doing this:
I'm quite inclined to go with approach (1). It's simple and avoiding the downsides in (1c) and (1d) don't seem worth the engineering/maintenance complexity. |
Regardless of which approach we implement, we should get rid of the |
Approaches based on |
Unfortunately this also has the problem that it goes to Given this, the only downside with approch (1) is that it "debits" 1 byte of entropy from |
Fixed in 0.17.0 by switching to |
libsodium polls on
/dev/random
to make sure the kernel’s PRNG is seeded. This can uncover real problems in virtualized environments.The text was updated successfully, but these errors were encountered: