[Openstack-security] [Bug 1319643] Re: Using random.random() should not be used to generate randomness used for security reasons
Robert Clark
1319643 at bugs.launchpad.net
Tue May 27 08:38:31 UTC 2014
Where there's a defined security feature in OpenStack, such as here with
the use of cryptographic functions in Cinder we should ensure that they
are done correctly. I think failures to do this _are_ security issues
and should be addressed and documented as such.
This probably isn't a big enough issue to warrant an OSSA and I don'
think that an OSSN would be appropriate either if the plan is to improve
this in the next release.
--
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1319643
Title:
Using random.random() should not be used to generate randomness used
for security reasons
Status in Cinder:
Triaged
Status in OpenStack Security Advisories:
Won't Fix
Bug description:
In cinder code : /cinder/transfer/api.py . Below line of code used
random.random() to generate a random number, Standard random number
generators should not be used to generate randomness used for security
reasons. Could we use a crytographic randomness generator to provide
sufficient entropy to instead of it?
rndstr = ""
random.seed(datetime.datetime.now().microsecond)
while len(rndstr) < length:
rndstr += hashlib.sha224(str(random.random())).hexdigest() ---------------> This line has described issues.
return rndstr[0:length]
To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1319643/+subscriptions
More information about the Openstack-security
mailing list