[tahoe-lafs-trac-stream] [tahoe-lafs] #1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
tahoe-lafs
trac at tahoe-lafs.org
Tue Feb 26 19:56:02 UTC 2013
#1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
--------------------------------+---------------------------
Reporter: midnightmagic | Owner:
Type: defect | Status: new
Priority: major | Milestone: undecided
Component: code | Version: 1.9.2
Keywords: netbsd,/dev/random | Launchpad Bug:
--------------------------------+---------------------------
It *looks* as though the NetBSD /dev/random from earlier than 6.0 (prior
to Thor's patch which overhauled it to supply unlimited amounts of random
data) does not supply enough bytes to get Tahoe LAFS through the test
phase *at all times*.
If you turn off all sources of mixed entropy via NetBSD rndctl, and
exhaust it continuously (cat /dev/random > /dev/null) it is possible to
reproduce the issue semi-regularly.
It manifests as failed RSA invertibility tests in the test suite.
Running crypto++ test binary under the same conditions makes crypto++
complain bitterly about how long it has to wait for random bytes to be
supplied from /dev/random, but it does not technically fail: just complain
about it.
I believe it is this issue which is not being handled correctly.
I have no direct evidence this is so.
Updating to NetBSD >= Thor's /dev/random overhaul appears to correct the
issue.
--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1924>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list