-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The default RNG of Builders isn't cryptographically secure #356
Comments
This bit is a bit tricky; I believe we used to use The scary part is indeed scary, luckily on Linux, I am not aware of any actual circumstance where Historically, all cryptography (e.g. Regarding newer versions of There's no excuse for the defaults not being as secure as possible though, so I will be putting in a PR soon to fix this across the board for good. We do have some other issues that interfaces that are strictly used for unit-testing only (such as the Thank you very much for reporting this issue! |
Fixed in HydraBadger as of now: poanetwork/hydrabadger@e5b9c8c |
Thank you for your fast response :) |
This has been thoroughly fixed with #357. RNGs are now firmly in the user's hands. |
DynamicHoneyBadgerBuilder
andHoneyBadgerBuilder
useThreadRng
as their default RNG which isn't cryptographically secure according to therand 0.4.2
docs. Updating to a more recent version ofrand
would probably fix this problem.The scariest part of the
0.4.2
ThreadRng
is:The text was updated successfully, but these errors were encountered: