Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Require entropy sourcing to succeed #16

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

cipherboy
Copy link

@cipherboy cipherboy commented Apr 29, 2022

We introduce a new method with a simplified call signature (directly
returning a string), internally panic()'ing if the entropy read failed.

For most security products, a faulty underlying RNG/entropy source
should be considered a fatal error as it generally isn't (software)
recoverable without additional operator input. The higher layers of our
software likely shouldn't retrigger the request (or continue to other
sensitive operations) without this being addressed.

Signed-off-by: Alexander Scheel <[email protected]>


This admittedly partially undoes 132dbc4 , with the argument that it was the right choice. But we allow consumers of the library which they want to use.

We introduce a new method with a simplified call signature (directly
returning a string), internally panic()'ing if the entropy read failed.

For most security products, a faulty underlying RNG/entropy source
should be considered a fatal error as it generally isn't (software)
recoverable without additional operator input. The higher layers of our
software likely shouldn't retrigger the request (or continue to other
sensitive operations) without this being addressed.

Signed-off-by: Alexander Scheel <[email protected]>
@cipherboy cipherboy requested a review from jefferai April 29, 2022 12:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant