tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: OpenSSH/OpenSSL patches to stop excessive entropy consumption
On Sun, Mar 04, 2012 at 02:20:54PM +0100, Pawel Jakub Dawidek wrote:
> On Sat, Mar 03, 2012 at 11:12:23PM -0500, Thor Lancelot Simon wrote:
> > Sorry, something was wrong with that diff. This one is right.
>
> > - arc4random_stir();
> > - arc4random_buf(rnd, sizeof(rnd));
> > + assert((read(urandom_fd, rnd, sizeof(rnd)) == sizeof(rnd)));
>
> This is very bad idea to execute code as an assert() condition.
> assert() is optional and if code is compiled with NDEBUG it will be
> turned into no-op and in your case no random data will be read at all,
> which makes this change dangerous.
Yes. Someone noticed this within minutes -- already fixed. Thanks.
A bad idea to do this even for debugging during development; as this
shows, it can easily leak out into the real world...
Thor
Home |
Main Index |
Thread Index |
Old Index