Conversation

This Tweet was deleted by the Tweet author. Learn more
Replying to
Does it read entropy from /dev/urandom to protect hash table against "Algorithmic Complexity Attacks"? Is getrandom(2) the solution? Or init API that receives entropy from caller?
1
Replying to and
On Linux, getrandom is always the right approach. The /dev/urandom and /dev/random APIs are obsolescent. They aren't always available since they require access to a populated /dev, there's the dynamic failure case from using dynamic allocation (of files) and the early init bug.
1
Every system using the Linux kernel is vulnerable to potential issues comparable to the Debian OpenSSL CSPRNG breakage due to the /dev/urandom implementation. The /dev/urandom pool is the right one to use for nearly everything but the API is broken. It's crucial to use getrandom.
I believe we need to find solutions that don't require randomization & crypto at these layers (malloc and hashtables). I understand why people do it as defense-in-depth but I prefer approaches that solve these problems statically (e.g. avoiding memory-unsafe langs & hashtables).
1
1
Show replies