Home page logo

bugtraq logo Bugtraq mailing list archives

Re: Tempfile vulnerabilities
From: berendi2 () WEBDESIGN HU (Peter Berendi)
Date: Tue, 8 Feb 2000 15:06:55 +0100

On Sat, 5 Feb 2000, antirez wrote:
Sure but there is another problem, while evil user exec 'cat /dev/random >
 /dev/null &' maybe that the following results in an infinite loop:

while(there_are_enougt_entropy() == 0)
/* race -- what if the evil user starts to deplate the entropy pool here? */

Can be so easy to DoS cryptographic software?

Because of this, crypto software should open /dev/random in blocking mode.

random_fd = open("/dev/random", O_RDONLY);
read(random_fd, &seed, sizeof(seed));

At least it will not stop, but progress very slowly.

I became curious, and straced my ssh client (1.2.26, debian/slink) while
running cat /dev/random >/dev/null. I saw

open("/dev/random", O_RDONLY)           = 5
read(5, 0xbfffcdfc, 32)                 = -1 EAGAIN (Resource temporarily

three times in the strace output, none were successful. Interesting, since
I never ran ssh as root before (now needed for strace), therefore I didn't
even have a .ssh/random_seed file. I think it should at least complain and
request confirmation.

PLESR | This great thing can be swallowed,
WRTED | But can also swallow us.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]