[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH8yC8moNo7DN06dAt+hUhARuNBkUNAhuS4sxUYCcjWew76hsg@mail.gmail.com>
Date: Sun, 4 Jun 2017 01:54:12 -0400
From: Jeffrey Walton <noloader@...il.com>
To: Stephan Müller <smueller@...onox.de>
Cc: "Jason A. Donenfeld" <Jason@...c4.com>,
"Theodore Ts'o" <tytso@....edu>,
Linux Crypto Mailing List <linux-crypto@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
kernel-hardening@...ts.openwall.com
Subject: Re: get_random_bytes returns bad randomness before seeding is complete
On Sun, Jun 4, 2017 at 1:48 AM, Stephan Müller <smueller@...onox.de> wrote:
> Am Freitag, 2. Juni 2017, 16:59:56 CEST schrieb Jason A. Donenfeld:
>
>> Alternatively, I'm open to other solutions people might come up with.
>
> How about stirring in some data from the Jitter RNG that we have in the kernel
> already and that is used for the DRBG in case get_random_bytes has
> insufficient entropy? Yes, two kernel developers said that this RNG is
> useless, where in fact a lot of hardware and even crypto folks say that this
> approach has merits.
Almost anything has to be better than (1) silent failures, and (2)
draining the little entropy available when the generators are starting
and trying to become operational.
The [negative] use case for (2) is systemd. See, for example,
https://github.com/systemd/systemd/issues/4167.
Jeff
Powered by blists - more mailing lists