Adar Dembo has posted comments on this change.

Change subject: KUDU-1843. Client UUIDs should be cryptographically random
......................................................................


Patch Set 1:

(2 comments)

http://gerrit.cloudera.org:8080/#/c/6347/1/src/kudu/security/crypto.cc
File src/kudu/security/crypto.cc:

PS1, Line 258: std::
Nit: don't need


Line 264:   OPENSSL_RET_NOT_OK(RAND_bytes(buf.data(), bytes), "failed to 
generate random bytes");
I'm looking at 
https://wiki.openssl.org/index.php/Random_Numbers#Initialization. It looks like 
entropy is read from /dev/urandom rather than /dev/random; if you want to use 
the latter you have to call RAND_load_file() on it. Is that what we want? Is it 
secure to initialize openssl's PRNG using /dev/urandom, which is itself a PRNG?


-- 
To view, visit http://gerrit.cloudera.org:8080/6347
To unsubscribe, visit http://gerrit.cloudera.org:8080/settings

Gerrit-MessageType: comment
Gerrit-Change-Id: I0ea6868773cf046944f70c32c647184e4b48c772
Gerrit-PatchSet: 1
Gerrit-Project: kudu
Gerrit-Branch: master
Gerrit-Owner: Todd Lipcon <t...@apache.org>
Gerrit-Reviewer: Adar Dembo <a...@cloudera.com>
Gerrit-Reviewer: Dan Burkert <danburk...@apache.org>
Gerrit-Reviewer: David Ribeiro Alves <dral...@apache.org>
Gerrit-Reviewer: Kudu Jenkins
Gerrit-HasComments: Yes

Reply via email to