aboutsummaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2013-12-18 11:49:44 -0500
committerNick Mathewson <nickm@torproject.org>2013-12-18 11:53:07 -0500
commit7b87003957530427eadce36ed03b4645b481a335 (patch)
treef5e6f471eb9776e822309c34a530a87da9356933 /changes
parent561d9880f8025ddbcb2f0a586d0677908320af4f (diff)
downloadtor-7b87003957530427eadce36ed03b4645b481a335.tar
tor-7b87003957530427eadce36ed03b4645b481a335.tar.gz
Never allow OpenSSL engines to replace the RAND_SSLeay method
This fixes bug 10402, where the rdrand engine would use the rdrand instruction, not as an additional entropy source, but as a replacement for the entire userspace PRNG. That's obviously stupid: even if you don't think that RDRAND is a likely security risk, the right response to an alleged new alleged entropy source is never to throw away all previously used entropy sources. Thanks to coderman and rl1987 for diagnosing and tracking this down.
Diffstat (limited to 'changes')
-rw-r--r--changes/bug1040211
1 files changed, 11 insertions, 0 deletions
diff --git a/changes/bug10402 b/changes/bug10402
new file mode 100644
index 000000000..eac00bdc6
--- /dev/null
+++ b/changes/bug10402
@@ -0,0 +1,11 @@
+ o Major bugfixes:
+ - Do not allow OpenSSL engines to replace the PRNG, even when
+ HardwareAccel is set. The only default builtin PRNG engine uses
+ the Intel RDRAND instruction to replace the entire PRNG, and
+ ignores all attempts to seed it with more entropy. That's
+ cryptographically stupid: the right response to a new alleged
+ entropy source is never to discard all previously used entropy
+ sources. Fixes bug 10402; works around behavior introduced in
+ OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
+ and "rl1987".
+