aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordequis <dx@dxzone.com.ar>2014-07-10 08:07:51 -0300
committerdequis <dx@dxzone.com.ar>2015-01-26 00:27:24 -0300
commit5eab298f82c97d9181f2fb07deea51db567750b2 (patch)
tree52cf08cd26f32661a9fd30fa04904fd85b5dab65
parent11e782892c33d6ecae949bc610c075107c0cda89 (diff)
random_bytes: Use /dev/urandom only, don't bother trying /dev/random
Also abort() if there's no /dev/urandom See http://www.2uo.de/myths-about-urandom/ for details.
-rw-r--r--bitlbee.c4
-rw-r--r--lib/misc.c69
-rw-r--r--unix.c2
3 files changed, 10 insertions, 65 deletions
diff --git a/bitlbee.c b/bitlbee.c
index 90df135a..dae57f93 100644
--- a/bitlbee.c
+++ b/bitlbee.c
@@ -328,10 +328,6 @@ static gboolean bitlbee_io_new_client( gpointer data, gint fd, b_input_condition
{
irc_t *irc;
- /* Since we're fork()ing here, let's make sure we won't
- get the same random numbers as the parent/siblings. */
- srand( time( NULL ) ^ getpid() );
-
b_main_init();
/* Close the listening socket, we're a client. */
diff --git a/lib/misc.c b/lib/misc.c
index 6fedb48f..43322cab 100644
--- a/lib/misc.c
+++ b/lib/misc.c
@@ -413,69 +413,20 @@ signed int do_iconv( char *from_cs, char *to_cs, char *src, char *dst, size_t si
return outbuf - dst;
}
-/* A pretty reliable random number generator. Tries to use the /dev/random
- devices first, and falls back to the random number generator from libc
- when it fails. Opens randomizer devices with O_NONBLOCK to make sure a
- lack of entropy won't halt BitlBee. */
+/* A wrapper for /dev/urandom.
+ * If /dev/urandom is not present or not usable, it calls abort()
+ * to prevent bitlbee from working without a decent entropy source */
void random_bytes( unsigned char *buf, int count )
{
- static int use_dev = -1;
-
- /* Actually this probing code isn't really necessary, is it? */
- if( use_dev == -1 )
+ int fd;
+ if( ( ( fd = open( "/dev/urandom", O_RDONLY ) ) == -1 ) ||
+ ( read( fd, buf, count ) == -1 ) )
{
- if( access( "/dev/random", R_OK ) == 0 || access( "/dev/urandom", R_OK ) == 0 )
- use_dev = 1;
- else
- {
- use_dev = 0;
- srand( ( getpid() << 16 ) ^ time( NULL ) );
- }
- }
-
- if( use_dev )
- {
- int fd;
-
- /* At least on Linux, /dev/random can block if there's not
- enough entropy. We really don't want that, so if it can't
- give anything, use /dev/urandom instead. */
- if( ( fd = open( "/dev/random", O_RDONLY | O_NONBLOCK ) ) >= 0 )
- if( read( fd, buf, count ) == count )
- {
- close( fd );
- return;
- }
- close( fd );
-
- /* urandom isn't supposed to block at all, but just to be
- sure. If it blocks, we'll disable use_dev and use the libc
- randomizer instead. */
- if( ( fd = open( "/dev/urandom", O_RDONLY | O_NONBLOCK ) ) >= 0 )
- if( read( fd, buf, count ) == count )
- {
- close( fd );
- return;
- }
- close( fd );
-
- /* If /dev/random blocks once, we'll still try to use it
- again next time. If /dev/urandom also fails for some
- reason, stick with libc during this session. */
-
- use_dev = 0;
- srand( ( getpid() << 16 ) ^ time( NULL ) );
- }
-
- if( !use_dev )
- {
- int i;
-
- /* Possibly the LSB of rand() isn't very random on some
- platforms. Seems okay on at least Linux and OSX though. */
- for( i = 0; i < count; i ++ )
- buf[i] = rand() & 0xff;
+ log_message( LOGLVL_ERROR, "/dev/urandom not present - aborting" );
+ abort();
}
+
+ close( fd );
}
int is_bool( char *value )
diff --git a/unix.c b/unix.c
index e1ebb19d..7be82509 100644
--- a/unix.c
+++ b/unix.c
@@ -86,8 +86,6 @@ int main( int argc, char *argv[] )
otr_init();
#endif
- srand( time( NULL ) ^ getpid() );
-
global.helpfile = g_strdup( HELP_FILE );
if( help_init( &global.help, global.helpfile ) == NULL )
log_message( LOGLVL_WARNING, "Error opening helpfile %s.", HELP_FILE );