[13670] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Tempfile vulnerabilities

daemon@ATHENA.MIT.EDU (Werner Koch)
Wed Feb 2 16:47:01 2000

Mail-Followup-To: BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000202092732.A2096@frodo.gnupg.de>
Date:         Wed, 2 Feb 2000 09:27:32 +0100
Reply-To: Werner Koch <wk@GNUPG.ORG>
From: Werner Koch <wk@GNUPG.ORG>
X-To:         BUGTRAQ@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200002010455.XAA20677@pace.picante.com>; from
              gtaylor+bugtraq_hcdbb013100@PICANTE.COM on Mon, Jan 31,
              2000 at 11:55:18PM -0500

On Mon, 31 Jan 2000, Grant Taylor wrote:

> 	   open RAN, "/dev/random" || die;
> 	   read(RAN,$foo,16);
> 	   close RAN;
> 	   $file = '/tmp/autobuse' . unpack('H16',$foo);

Please, never use /dev/random or /dev/urandom for such purposes.

Aside the fact, that it does not help much in what you want to achieve
it is a desaster to system performance because it empties the system's
entropy pool and wastes precious entropy for unneeded things.

Crypto software _really_ needs these random numbers.


--
Werner Koch at guug.de           www.gnupg.org           keyid 621CC013

     Boycott Amazon!  -  http://www.gnu.org/philosophy/amazon.html

home help back first fref pref prev next nref lref last post