2016-02-04 3:06 GMT+01:00 David Lang <[email protected]>:

> 530f91a42307f33c9dd43a7d0c802b3fa469beec
>
> Author: Rainer Gerhards <[email protected]>
> Date:   Tue Feb 2 15:51:52 2016 +0100
>
>     prevent a clang static analyzer warning
>
>     The static analyzer correctly complains about "garbagge
>     value being used", but this is exactly what we want. The
>     code in question is a fallback when we cannot obtain any
>     other source of randomness for cryptography needs.
>
>
> If there is absolutely no source of randomness, cryptography should abort,
> not use whatever value happens to be in ram (which should be 0)
>
> If urandom isn't available, abort with a clear message that access to it
> is required, don't silently use garbage to initialize the cryptography.
>
>
Just to make things clear: this commit didn't change behaviour. It just
addresses the static analyzer warning but keeps everything else as-is. So
if I revert that change, the only thing that will change is that the static
analyzer will break all builds.

So the real issue is how to work if /dev/urandom is not available. I used
per-existing values in memory so far (based on my understanding that a
couple of tools do so). If the consensus is that this is a bad idea, we
have actually two choices:

a) error out (which could potentially completey exclude some platform)
b) use the c runtime library randon number generator (which, I think, is
*not* crypto-grade).

More comments are appreciated.

Rainer
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to