Skip to content

session: Remove PS_EXTRA_RAND_BYTES #10394

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jan 23, 2023

Conversation

TimWolla
Copy link
Member

This was introduced in 3467526 and the corresponding RFC gives some reasoning. However the CSPRNG being “not secure enough” is not a thing and reading these extra bytes is just security theater:

If the CSPRNG would hypothetically be broken, then PHP’s session IDs are the least of one’s concerns, because we already trust it in random_bytes() and might generate long-term secrets using that.

This was introduced in 3467526 and the
corresponding RFC gives some reasoning. However the CSPRNG being “not secure
enough” is not a thing and reading these extra bytes is just security theater:

If the CSPRNG would hypothetically be broken, then PHP’s session IDs are the
least of one’s concerns, because we already trust it in `random_bytes()` and
might generate long-term secrets using that.
@nielsdos
Copy link
Member

Changes make sense to me.

@TimWolla
Copy link
Member Author

TimWolla commented Jan 23, 2023

Is this something that needs to be mentioned in NEWS/UPGRADING? It should not have an externally or user-visible impact.

@Girgias
Copy link
Member

Girgias commented Jan 23, 2023

Is this something that needs to be mentioned in NEWS/UPGRADING? It should not have an externally or user-visible impact.

I don't think so

@TimWolla TimWolla merged commit d9c2cf7 into php:master Jan 23, 2023
@TimWolla TimWolla deleted the session-extra-rand-bytes branch January 23, 2023 13:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants