summaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2015-12-08 10:54:42 -0500
committerNick Mathewson <nickm@torproject.org>2015-12-08 10:54:42 -0500
commit2259de0de726f3f617b2451d64f72f0d4d6bc0ae (patch)
tree6aeca7dc70a1231f8fd413d9572adbdf0a5c228f /changes
parent943369f927967268cacd2067ccae0bc5f1c5835e (diff)
downloadtor-2259de0de726f3f617b2451d64f72f0d4d6bc0ae.tar.gz
tor-2259de0de726f3f617b2451d64f72f0d4d6bc0ae.zip
Always hash crypto_strongest_rand() along with some prng
(before using it for anything besides feeding the PRNG) Part of #17694
Diffstat (limited to 'changes')
-rw-r--r--changes/bug17694_strongest6
1 files changed, 6 insertions, 0 deletions
diff --git a/changes/bug17694_strongest b/changes/bug17694_strongest
new file mode 100644
index 0000000000..0a8954a25e
--- /dev/null
+++ b/changes/bug17694_strongest
@@ -0,0 +1,6 @@
+ o Minor features (security):
+ - Never use the system entropy output directly for anything besides
+ seeding the PRNG. When we want to generate important keys, instead
+ of using system entropy directly, hash it with the PRNG stream.
+ This may help resist certain attacks based on broken OS entropy
+ implementations. Closes part of ticket 17694. \ No newline at end of file