On Tue, Jan 12, 2016 at 4:36 AM, Kaduk, Ben via RT <r...@openssl.org> wrote: > On 01/11/2016 06:01 PM, Salz, Rich via RT wrote: >>> I am a bit worried when I see C-beginner mistakes like this in a security >>> suite: >>> When using sscanf on data you have not produced yourself, you should >>> always assume they will be bigger that your largest buffer/variable and deal >>> correctly with that.
>> That's a bit of an exaggeration here. It's not network data coming in from >> somewhere else, it's a number typed on the command line in a local program. The worry is not about this particular case (where it does not seem to be possible to abuse), but as a general observation: If the rest of the code has the same quality, then we will be screwed. > There's also the part where asking 'openssl rand' for gigabytes of data > is not necessarily a good idea -- I believe in the default configuration > on unix, it ends up reading 32 bytes from /dev/random and using that to > seed EAY's md_rand.c scheme, which is not exactly a state-of-the-art > CSPRNG these days... We do not know what they will be using these data for (in my case a user wanted it for overwriting a harddrive, so the quality mattered less than the speed). But if it is unsafe for generating GB's of data based on a 32-byte seed, then by all means read another 32-byte seed now and then (but please do it from /dev/urandom: http://www.2uo.de/myths-about-urandom/). /Ole _______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev