[ntp:security] [Bug 2666] non-cryptographic random number generator with weak seed

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Mon Nov 3 05:06:56 UTC 2014


Danny Mayer <mayer at ntp.org> changed:

           What    |Removed                     |Added
                 CC|                            |mayer at ntp.org

--- Comment #2 from Danny Mayer <mayer at ntp.org> 2014-11-03 05:06:56 UTC ---
(In reply to comment #1)
> I'm currently planning to use the arc4random() routines if available, and
> completely fill the seed buffer.

There is a portable version of arc4random() from OpenBSD which looks like it is
free for any reuse. You can find it here:
https://github.com/libevent/libevent/blob/master/arc4random.c but of course
someone needs to review it to make sure it's not considered weak and can be
reused in this case.

Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list