Subject: | Systems without /dev/random may leak secret key |
As taught by the '09 Debian PGP disaster relating to DSA, the randomness
source is extremely important. On systems without /dev/random,
Crypt::DSA falls back to using Data::Random. Data::Random uses rand(),
about which the perldoc says "rand() is not cryptographically secure.
You should not rely on it in security-sensitive situations."
In the case of DSA, this is even worse. Using improperly secure
randomness sources can compromise the signing key upon signature of a
message. See:
http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/
I will provide a patch to disable this fallback. Bug 21968 should be
closed as INVALID.
Sincerely,
Harlan Lieberman-Berg