[
https://issues.apache.org/jira/browse/HBASE-14089?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Sean Busbey updated HBASE-14089:
--------------------------------
Fix Version/s: (was: 1.2.1)
1.2.0
> Remove unnecessary draw of system entropy from RecoverableZooKeeper
> -------------------------------------------------------------------
>
> Key: HBASE-14089
> URL: https://issues.apache.org/jira/browse/HBASE-14089
> Project: HBase
> Issue Type: Bug
> Reporter: Andrew Purtell
> Assignee: Andrew Purtell
> Priority: Minor
> Fix For: 2.0.0, 0.98.14, 1.0.2, 1.2.0, 1.1.2, 1.3.0
>
> Attachments: HBASE-14089.patch
>
>
> I had a look at instances where we use SecureRandom, which could block if
> insufficient entropy, in the 0.98 and master branch code. (Random in contrast
> is a PRNG seeded by System#nanoTime, it doesn't draw from system entropy.)
> Most uses are in encryption related code, our native encryption and SSL, but
> we do also use SecureRandom for salting znode metadata in
> RecoverableZooKeeper#appendMetadata, which is called whenever we do setData.
> Conceivably we could block unexpectedly when constructing data to write out
> to a znode if entropy gets too low until more is available.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)