diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-01-29 21:23:11 -0600 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-01-29 21:23:11 -0600 |
commit | 136ff17aceac8b61cd1c3f12774c3d1f9cf6742a (patch) | |
tree | 320245f879c47bba8f959520b2f3ce0dad9ec4fc /docs | |
parent | 5ff316753118ac1445858a111c8d76da1c7c3e40 (diff) | |
download | cryptography-136ff17aceac8b61cd1c3f12774c3d1f9cf6742a.tar.gz cryptography-136ff17aceac8b61cd1c3f12774c3d1f9cf6742a.tar.bz2 cryptography-136ff17aceac8b61cd1c3f12774c3d1f9cf6742a.zip |
update random engine docs
Diffstat (limited to 'docs')
-rw-r--r-- | docs/hazmat/backends/openssl.rst | 30 |
1 files changed, 20 insertions, 10 deletions
diff --git a/docs/hazmat/backends/openssl.rst b/docs/hazmat/backends/openssl.rst index 5ad00d03..17d01ca8 100644 --- a/docs/hazmat/backends/openssl.rst +++ b/docs/hazmat/backends/openssl.rst @@ -28,15 +28,25 @@ The `OpenSSL`_ C library. OS Random Engine ---------------- -OpenSSL has a CSPRNG that it seeds when starting up. Unfortunately, its state -is replicated when the process is forked and child processes can deliver -similar or identical random values. OpenSSL has landed a patch to mitigate this -issue, but this project can't rely on users having recent versions. - -To work around this cryptography uses a custom OpenSSL engine that replaces the -standard random source with one that fetches entropy from ``/dev/urandom`` (or -CryptGenRandom on Windows). This engine is **active** by default when importing -the OpenSSL backend. It is added to the engine list but not activated if you -only import the binding. +OpenSSL uses a userspace CSPRNG that is seeded from system random ( +``/dev/urandom`` or ``CryptGenRandom``). This CSPRNG is not reseeded +automatically when a process calls ``fork()``. This can result in situations +where two different processes can return similar or identical keys and +compromise the security of the system. + +The approach this project has chosen to mitigate this vulnerability is to +include an engine that replaces the OpenSSL default CSPRNG with one that sources +its entropy from ``/dev/urandom`` on UNIX-like operating systems and uses +``CryptGenRandom`` on Windows. This method of pulling from the system pool +allows us to avoid potential issues with `initializing the RNG`_ as well as +protecting us from the ``fork()`` weakness. + +This engine is **active** by default when importing the OpenSSL backend. It is +added to the engine list but **not activated** if you only import the binding. +If you wish to deactivate it call ``unregister_osrandom_engine()`` on the +backend object. .. _`OpenSSL`: https://www.openssl.org/ +.. _`initializing the RNG`: http://en.wikipedia.org/wiki/OpenSSL#Vulnerability_in_the_Debian_implementation +.. _`Yarrow`: http://en.wikipedia.org/wiki/Yarrow_algorithm +.. _`Fortuna`: http://en.wikipedia.org/wiki/Fortuna_(PRNG) |