lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180426055106.GA4977@amd>
Date:   Thu, 26 Apr 2018 07:51:06 +0200
From:   Pavel Machek <pavel@....cz>
To:     Paul Menzel <pmenzel+linux-random-number@...gen.mpg.de>
Cc:     Theodore Ts'o <tytso@....edu>, linux-kernel@...r.kernel.org
Subject: Re: Linux messages full of `random: get_random_u32 called from`

Hi!

> Since Linux 4.17-rcX, Linux spams a lot of `random: get_random_u32 called
> from` messages. I believe, this setting should be reverted by default as
> otherwise a lot of other messages are not seen.
> 
> Please find my configuration attached.

Same here, thinkpad X60:

[    3.163839] systemd[1]: Failed to insert module 'ipv6'
[    3.181266] systemd[1]: Set hostname to <amd>.
[    3.267243] random: systemd-sysv-ge: uninitialized urandom read (16
bytes read)
[    3.669590] random: systemd-sysv-ge: uninitialized urandom read (16
bytes read)
[    3.696242] random: systemd: uninitialized urandom read (16 bytes
read)
[    3.700066] random: systemd: uninitialized urandom read (16 bytes
read)
[    3.703716] random: systemd: uninitialized urandom read (16 bytes
read)
[    3.756137] random: systemd: uninitialized urandom read (16 bytes
read)
[    3.760460] random: systemd: uninitialized urandom read (16 bytes
read)
[    3.764515] random: systemd: uninitialized urandom read (16 bytes
read)
[    3.835312] random: systemd: uninitialized urandom read (16 bytes
read)
[    4.173204] systemd[1]: Binding to IPv6 address not available since
kernel does not support IPv6.
[    4.176977] systemd[1]: [/lib/systemd/system/gpsd.socket:6] Failed
to parse address value, ignoring: [::1]:2947
[    4.186472] systemd[1]: Starting Forward Password Requests to Wall
Directory Watch.
[    4.188845] systemd[1]: Started Forward Password Requests to Wall
Directory Watch.

-- 
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ