oss-sec mailing list archives
Re: CVE Request: static IV used in Percona XtraBackup
From: Michael Samuel <mik () miknet net>
Date: Wed, 27 Nov 2013 10:09:49 +1100
On 27 November 2013 05:17, Florian Weimer <fweimer () redhat com> wrote:
Is suppose this is part of the fix.
+void
+xb_crypt_init_iv()
+{
+ uint seed = time(NULL);
+ srandom(seed);
+}
That's at-best a 32-bit nonce, but would only repeat of srandom() had collisions. Presumably more than 1 backup a second is rare? Just reading data from /dev/urandom would be more robust. On a side note, a constant IV isn't fatal so long as a unique key is used every time. Is the key random, password derived or constant? Regards, Michael
Current thread:
- CVE Request: static IV used in Percona XtraBackup Marcus Meissner (Nov 26)
- Re: CVE Request: static IV used in Percona XtraBackup Kurt Seifried (Nov 26)
- Re: CVE Request: static IV used in Percona XtraBackup P J P (Nov 27)
- Re: CVE Request: static IV used in Percona XtraBackup Florian Weimer (Nov 26)
- Re: CVE Request: static IV used in Percona XtraBackup Michael Samuel (Nov 26)
- Re: CVE Request: static IV used in Percona XtraBackup Kurt Seifried (Nov 26)
