[tahoe-lafs-trac-stream] [tahoe-lafs] #1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
tahoe-lafs
trac at tahoe-lafs.org
Mon Mar 11 16:49:41 UTC 2013
#1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
-------------------------------+------------------------------------
Reporter: midnightmagic | Owner:
Type: defect | Status: new
Priority: major | Milestone: undecided
Component: code | Version: 1.9.2
Resolution: | Keywords: netbsd random cryptopp
Launchpad Bug: |
-------------------------------+------------------------------------
Comment (by zooko):
> In wrapping crypto++, does pycryptopp disable any blocking reads from
/dev/random in some fashion?
Oooh.
{{{
AutoSeededRandomPool osrng(false);
}}}
from:
[//trac/pycryptopp/browser/git/src/pycryptopp/publickey/rsamodule.cpp?annotate=blame&rev=9c884d4ea2c75bc47dc49d4c404bfc5a9fc3b437#L297]
The {{{false}}} is the argument to the parameter "blocking":
[//trac/pycryptopp/browser/git/src-
cryptopp/osrng.h?annotate=blame&rev=9c884d4ea2c75bc47dc49d4c404bfc5a9fc3b437#L84].
However, I still refuse to believe that if I tell it to use an RNG in non-
blocking mode, and the OS is providing an underlying RNG which is
blocking, that this means it generates a {{{yᵉ ≠ x mod N}}}. What it
//should// do if I require non-blocking and the underlying pool is
blocking is either use a non-blocking underlying pool (/dev/urandom), or
raise an exception.
--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1924#comment:11>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list