Replies: 6 comments 3 replies
-
MIPS compiler for OpenWrt has problem with undeclared identifiers in rng/rng-alg-fst.c file error message:
solution for rng/rng-alg-fst.c
|
Beta Was this translation helpful? Give feedback.
-
This is not a security bug. When cross-compiling,
As an aside, you have caught a security nuisance if not security hole: This is a slow ugly hack to AES to try and make it less vulnerable to cache timing attacks. The real solution is to replace that with RadioGatún[32] (or another cryptographic strong pseudo-random number generator) like what Deadwood does. |
Beta Was this translation helpful? Give feedback.
-
I wasn't sure where to ask this, and it might have some security implications, so, here goes... What is the purpose of embedding a random number in deadwood at build time? The comment suggests that this random number is mainly targeted at windows, does it fall back to this embedded random prime number if /dev/urandom is not present at runtime? Would it be possible to fail hard if /dev/urandom wasn't available instead for environments where /dev/urandom is expected to be present (e.g. most linux distrubitons)? Embedding a random number at build time means for a given package build on many software distributions, all users of that version get the same "random" number. It also means that it is essentially impossible to build upstream maradns bit-for-bit identically, even if nothing in the build environment has changed since a previous build: https://reproducible-builds.org The Debian package builds reproducibly by patching it to use the same "random" number every time: https://sources.debian.org/src/maradns/2.0.13-1.4/debian/patches/deadwood_makefile.patch/ ... but this could have some dangerous consequences if the random number is indeed needed for security sensitive purposes. I was looking into this issue for GNU Guix, and started a thread about it: https://lists.gnu.org/archive/html/guix-devel/2022-06/msg00110.html Would very much appreciate some guidance with someone familiar with the maradns codebase as to what the security implications are, and suggestions for how to go about making the builds reproducible without introducing security issues! Thanks! |
Beta Was this translation helpful? Give feedback.
-
Locking discussion to stop spam bots. If you have an issue, start a new discussion. |
Beta Was this translation helpful? Give feedback.
-
Unlocking...it’s important to make it as easy as possible to report security bugs. I’ll delete support requests improperly placed here, however. |
Beta Was this translation helpful? Give feedback.
-
Locked again. Report vulnerabilities here: https://github.com/samboy/MaraDNS/security/advisories |
Beta Was this translation helpful? Give feedback.
-
If you believe you have found a security issue in MaraDNS, please report it at https://github.com/samboy/MaraDNS/security/advisories
This thread is now locked. Thank you for your understanding.
Beta Was this translation helpful? Give feedback.
All reactions