Univention Bugzilla – Bug 46260
makepasswd blocks, reads from /dev/random (instead urandom)
Last modified: 2018-03-14 14:38:15 CET
since 1.10-10 makepasswd in debian stretch reads from /dev/random and potentially blocks ... https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=792535 maybe we should revert this: * Convert from Crypt::OpenSSL::Random to Bytes::Random::Secure (closes: #792535).
Created attachment 9380 [details] NonBlocking.patch I've looked at the POD and code of libbytes-random-secure-perl-0.28/lib/Bytes/Random/Secure.pm and came up with this patch. Worked in my quick test (repeated strace ./makepasswd 2>&1 | grep urandom).
(In reply to Arvid Requate from comment #1) > Created attachment 9380 [details] > NonBlocking.patch > > I've looked at the POD and code of > libbytes-random-secure-perl-0.28/lib/Bytes/Random/Secure.pm and came up with > this patch. Worked in my quick test (repeated strace ./makepasswd 2>&1 | > grep urandom). Looks good. Without patch makepasswd opens random, with patch urandom. r18028: added patch
[4.3-0 278a474226] Bug #46260: changelog
OK, /dev/urandom is used. I've made a small change to the changelog entry: [4.3-0 37124a5528] Bug #46260
UCS 4.3 has been released: https://docs.software-univention.de/release-notes-4.3-0-en.html https://docs.software-univention.de/release-notes-4.3-0-de.html If this error occurs again, please use "Clone This Bug".