On 02/06/15 02:34, Georg Koppen wrote:
Hi,

inline is a patch to avoid using /dev/random on Windows in ssp.c. If it
is getting used there might be a local malicious process supplying fake
random values (e.g. via C:\dev\random) rendering SSP useless.

Comments/review are much appreciated. The patch is against the 4.9 branch:

 From 372698ef051b776cc30e9ebd2aac7291c19ff506 Mon Sep 17 00:00:00 2001
From: Erinn Clark <er...@torproject.org>
Date: Wed, 12 Mar 2014 16:09:10 +0100
Subject: [PATCH] Don't use /dev/random on Windows, because it is not a
thing.
  Apart from that some process might be able to supply fake
  random data with e.g. c:\dev\urandom rendering SSP useless.

This patch was written by skruffy, thanks!
Thanks. I've written a ChangeLog for this change and installed it on the trunk.

Jeff

Reply via email to