-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Intercept /proc/sys/kernel/random/uuid #3188
Comments
It looks like the After enabling strace logging in the tor minimal test:
|
Using
|
Oh boy, that seems bad! Could be the last rng leak causing some non-determinism I've anecdotally noticed. |
Yup, definitely seems worth fixing :) It's a little more complex than e.g. |
Actually maybe That just leaves generating valid UUID strings using the host's RNG |
Might also be good to check if the random uuid is changed/regenerated when you seek to the start of the file, since some other files in /dev will sometimes do this and applications might rely on it if it does. |
From
proc(2)
:I noticed the tor unit tests read this file; not sure whether tor reads it in production.
The text was updated successfully, but these errors were encountered: