Thanks to visit codestin.com
Credit goes to postgrespro.com

Re: OpenSSL randomness seeding - Mailing list pgsql-hackers

From David Steele
Subject Re: OpenSSL randomness seeding
Date
Msg-id [email protected]
Whole thread Raw
In response to Re: OpenSSL randomness seeding  (Daniel Gustafsson <[email protected]>)
Responses Re: OpenSSL randomness seeding
List pgsql-hackers
On 7/21/20 3:44 PM, Daniel Gustafsson wrote:
>> On 21 Jul 2020, at 17:31, David Steele <[email protected]> wrote:
>> On 7/21/20 8:13 AM, Daniel Gustafsson wrote:
> 
>>> Another thing that stood out when reviewing this code is that we optimize for
>>> RAND_poll failing in pg_strong_random, when we already have RAND_status
>>> checking for a sufficiently seeded RNG for us.  ISTM that we can simplify the
>>> code by letting RAND_status do the work as per 0002, and also (while unlikely)
>>> survive any transient failures in RAND_poll by allowing all the retries we've
>>> defined for the loop.
>>
>> I wonder how effective the retries are going to be if they happen immediately. However, most of the code paths I
followedended in a hard error when pg_strong_random() failed so it may not hurt to try. I just worry that some caller
isdepending on a faster failure here.
 
> 
> There is that, but I'm not convinced that relying on specific timing for
> anything RNG or similarly cryptographic-related is especially sane.

I wasn't thinking specific timing -- just that the caller might be 
expecting it to give up quickly if it doesn't work. That's what the code 
is trying to do and I wonder if there is a reason for it.

But you are probably correct and I'm just overthinking it.

Regards,
-- 
-David
[email protected]



pgsql-hackers by date:

Previous
From: Justin Pryzby
Date:
Subject: Re: v13 planner ERROR: could not determine which collation to use for string comparison
Next
From: Bruce Momjian
Date:
Subject: Re: Default setting for enable_hashagg_disk