• dan@upvote.au
    link
    fedilink
    arrow-up
    4
    ·
    7 months ago

    OpenSSL did add to the entropy pool a bunch uninitialized memory and the PID.

    Did they have a comment above the code explaining why it was doing it that way? If not, I’d blame OpenSSL for it.

    The OpenSSL codebase has a bunch of issues, which is why somewhat-API-compatible forks like LibreSSL and BoringSSL exist.

    • suy@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      7 months ago

      I’d have to dig it, but I think it said that it added the PID and the uninitialized memory to add a bit more data to the entropy pool in a cheap way. I honestly don’t get how that additional data can be helpful. To me it’s the very opposite. The PID and the undefined memory are not as good quality as good randomness. So, even without Debian’s intervention, it was a bad idea. The undefined memory triggered valgrind, and after Debian’s patch, if it weren’t because of the PID, all keys would have been reduced to 0 randomness, which would have probably raised the alarm much sooner.