Bootstrap token RNG seeding should be made explicit #67
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Info
Severity: LOW
Attack vector: network-only
Impact
Could allow bootstrap token prediction if the RNG is not actually seeded from operating-system entropy.
Description
The bootstrap token generation path uses
rand::make_rng(), and the report calls out that the entropy source should be explicitly confirmed. If this ever resolved to a deterministic or incorrectly seeded RNG, bootstrap tokens would become predictable.Example flow
Mitigation
Use an explicitly OS-seeded RNG path and assert that bootstrap token generation always derives entropy from the operating system.