Conversation

This Tweet was deleted by the Tweet author. Learn more
Replying to
Does it read entropy from /dev/urandom to protect hash table against "Algorithmic Complexity Attacks"? Is getrandom(2) the solution? Or init API that receives entropy from caller?
1
The maintainers should fix the early init security bug in /dev/urandom, but they aren't yet willing to do it based on the lackluster kernel entropy generation combined with broad deployment of broken environments not providing entropy such as poor virtual machine implementations.
2
Every system using the Linux kernel is vulnerable to potential issues comparable to the Debian OpenSSL CSPRNG breakage due to the /dev/urandom implementation. The /dev/urandom pool is the right one to use for nearly everything but the API is broken. It's crucial to use getrandom.