Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751562AbdFGOnP (ORCPT ); Wed, 7 Jun 2017 10:43:15 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:57067 "EHLO out1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750831AbdFGOmc (ORCPT ); Wed, 7 Jun 2017 10:42:32 -0400 X-ME-Sender: X-Sasl-enc: Impb6rJjnLOoxbxuSYnfILEKRnM/Dox0bDsPnL6DLtau 1496846551 Date: Wed, 7 Jun 2017 11:42:28 -0300 From: Henrique de Moraes Holschuh To: Stephan =?iso-8859-1?Q?M=FCller?= Cc: "Theodore Ts'o" , "Jason A. Donenfeld" , Eric Biggers , Linux Crypto Mailing List , LKML , kernel-hardening@lists.openwall.com, Greg Kroah-Hartman , David Miller , Herbert Xu Subject: Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using Message-ID: <20170607144228.GB5705@khazad-dum.debian.net> References: <20170606005108.5646-1-Jason@zx2c4.com> <20170606170319.5eva2yoxxeru5p74@thunk.org> <20170606221910.GB9057@khazad-dum.debian.net> <1691714.1h4IbvMDSf@tauon.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1691714.1h4IbvMDSf@tauon.chronox.de> X-GPG-Fingerprint1: 4096R/0x0BD9E81139CB4807: C467 A717 507B BAFE D3C1 6092 0BD9 E811 39CB 4807 User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 866 Lines: 21 On Wed, 07 Jun 2017, Stephan M?ller wrote: > Am Mittwoch, 7. Juni 2017, 00:19:10 CEST schrieb Henrique de Moraes Holschuh: > > On that same idea, one could add an early_initramfs handler for entropy > > data. > > Any data that comes from outside during the boot process, be it some NVRAM > location, the /var/lib...seed file for /dev/random or other approaches are > viewed by a number of folks to have zero bits of entropy. > > I.e. this data is nice for stirring the pool, but is not considered to help > our entropy problem. Stirring the pool is actually the objective, not entropy accounting. Let's not lose sight of what is really important. But yes, you are quite correct in that it won't help anything that would like to block due to entropy accouting, or which needs to be certain about the amount of randomness in the pools. -- Henrique Holschuh