[tahoe-lafs-trac-stream] [tahoe-lafs] #1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites

tahoe-lafs trac at tahoe-lafs.org
Tue Feb 26 19:56:02 UTC 2013


#1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
--------------------------------+---------------------------
 Reporter:  midnightmagic       |          Owner:
     Type:  defect              |         Status:  new
 Priority:  major               |      Milestone:  undecided
Component:  code                |        Version:  1.9.2
 Keywords:  netbsd,/dev/random  |  Launchpad Bug:
--------------------------------+---------------------------
 It *looks* as though the NetBSD /dev/random from earlier than 6.0 (prior
 to Thor's patch which overhauled it to supply unlimited amounts of random
 data) does not supply enough bytes to get Tahoe LAFS through the test
 phase *at all times*.

 If you turn off all sources of mixed entropy via NetBSD rndctl, and
 exhaust it continuously (cat /dev/random > /dev/null) it is possible to
 reproduce the issue semi-regularly.

 It manifests as failed RSA invertibility tests in the test suite.

 Running crypto++ test binary under the same conditions makes crypto++
 complain bitterly about how long it has to wait for random bytes to be
 supplied from /dev/random, but it does not technically fail: just complain
 about it.

 I believe it is this issue which is not being handled correctly.

 I have no direct evidence this is so.

 Updating to NetBSD >= Thor's /dev/random overhaul appears to correct the
 issue.

-- 
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1924>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list