[ 
https://issues.apache.org/jira/browse/SOLR-10338?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15945467#comment-15945467
 ] 

Ishan Chattopadhyaya commented on SOLR-10338:
---------------------------------------------

{code}
A read from the /dev/urandom device will not block waiting for more entropy.  
If there is not sufficient  entropy,  a  pseudorandom  number generator  is  
used to create the requested bytes.  As a result, in this case the returned 
values are theoretically vulnerable to a crypto‐graphic attack on the 
algorithms used by the driver.
{code}
Here's an excerpt from the {{man random}} page in GNU/Linux. Given this, I'd be 
reluctant to make the /dev/urandom as the default.

> Configure SecureRandom non blocking
> -----------------------------------
>
>                 Key: SOLR-10338
>                 URL: https://issues.apache.org/jira/browse/SOLR-10338
>             Project: Solr
>          Issue Type: Sub-task
>            Reporter: Mihaly Toth
>            Assignee: Mark Miller
>             Fix For: 4.9, 6.0
>
>         Attachments: SOLR-10338.patch, SOLR-10338.patch
>
>
> It would be best if SecureRandom could be made non blocking. In that case we 
> could get rid of random entropy exhaustion issue related to all usages of 
> SecureRandom.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to