-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Urandom and Random using Mcrypt #12
Comments
An additional mcrypt source (or two) can definitely be added. I wouldn't "replace" the dev/(u)random sources, but augment them. Additionally, if security is a concern, the server wouldn't be running openbasedir, but instead would be running a chroot jail. |
Yes using it as an augmentation was what I had in mind and is how I implemented it as well. In my case giving priority to the Mcrypt variant, because it's code will be more scrutinized than anything I ever wrote. :P I agree the chroot jail would be better than |
Everything using "mcryp" is just a bad idea. |
Honestly, I trust mcrypt more than I do OpenSSL, having read the source code of both. Note: that's not an endorsement of mcrypt, but a hit on OpenSSL. |
On a lot of Linux servers I noticed that using fopen to get
/dev/random
or/dev/urandom
data does not work because ofopen_basedir
restrictions.One way of bypassing this is using Mcrypt.
Consider adding a closure that can use this.
Example code:
The text was updated successfully, but these errors were encountered: