-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
no suitable CSPRNG 1.3.0 #99
Comments
Well in 1.3 the choice was made to not support openssl. There is a workaround provided in the release notes. |
Hi. Please check the version 1.3.0 release notes. We removed OpenSSL in 1.3.0 due to a preponderance of concerns over its reliability as a secure provider of random data. While downgrading to 1.2.2 is probably fine, your application would be far more secure if you made sure it could work with 1.3.0 instead. Can I ask:
|
actually it is not s VPS or VDS , it is a very limited shared host , i think it is debian , open_basedir is enable and i do not have access /dev/urandom |
Can you contact your shared host and request access to |
Same problem here, imo this should not have been a 1.3 release but a 2.0 release. This worked fine on my test local server, but my hosting server has no access to dev/urandom. |
I'm kind of regretting recommending this to be a 1.3 release. It's biting us in the ass on laravel too. |
OK, then, I'm going to do this:
Sound like a plan? |
👍 |
The above plan made sense to me, so I executed it. (I had a feeling that v2.0.0 was the most likely outcome when I posted this.) Sorry for any inconvenience this caused anyone (on a Friday, no less). The solution should be a |
symfony/polyfill-php70 relies on this component. So while doing a composer update it updated to the 1.3 version. I guess it's used for CSRF form tokens. This made every form page return a 500 error. So I guess that package should be responsible for relying on the 2.0 version with the workaround? Or alternatively updating the symfony requirements check? I have my own dedicated server, but I find very little information about how to make /dev/urandom readable |
Update to 1.4.0 or if you don't trust OpenSSL (I don't), upgrade to 2.0.0. |
If that's not empty, edit your php.ini file and add |
|
Well now I have this problem: If i want to enable open_basedir i have to whitelist a lot of folders. Doesn't feel very secure to me... But I have no clue what I'm doing. |
You're not supposed to enable it just to whitelist |
@narfbg thanks I fixed it, it was enabled although my php.ini had it commented out. I'm still using directadmin and that has a php configuration page where you can enable or disable open basedir for each domain. I forgot to check that one. So i commented out the |
why drop openssl completely, isn't it fixed in later php versions? rather compare php version? or do some feature test? |
|
This was reverted in 1.4.0. |
i understand it was reverted, but my question remains unanswered |
so, the "not fork() safe" is stronger reason for completely drop instead of just version compare of fixed php versions? |
What fixed versions? This problem is unfixable on any PHP system that uses Apache. Don't like it being "completely dropped"? Stick with 1.4. Otherwise, join us in 2.x land. |
In case it wasn't obvious, we're maintaining both 1.x and 2.x branches. 2.x has the added benefit of being truer to 1.x has greater compatibility. Use which ever one you prefer. |
This is the problem I'm referring to. Is there any point to continue this discussion? Use 1.x if you want OpenSSL, use 2.x if you do not. |
so this was the answer original question. my question is not about what version to use (i do not use any version of this library), i'm trying to understand background of decisions in this library. |
@glensc - That is a separate security issue also affecting the OpenSSL random bytes function that was fixed in a later PHP version. The other security issue (regarding forking) is a "cant fix/wont fix" from OpenSSL and as a result this function looks to be always be insecure on all versions of PHP. Edit - It actually looks like the PHP team is creating a patch for this: https://bugs.php.net/bug.php?id=71915 |
fyi, rather than allow php access to '/dev/urandom' (which I imagine would have some negative externalities), I just installed the php libsodium pecl extension. I encountered this issue with phplist v3.3.3 on a CentOS 7 server running apache v2.4.6 with php v5.6.33. Solution was to run:
See this article for more info: |
i'm getting error when upgrade to 1.3.0
Error : There is no suitable CSPRNG installed on your system on random.php file
my desktop ubuntu is PHP 7.0.4 and the Server PHP is 5.6 , i'm using random_compact in laravel 5.1
i can not fix it on Server so downgrade to 1.2.2
but on on my desktop everything is ok :)
The text was updated successfully, but these errors were encountered: