Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3683315imm; Sun, 13 May 2018 18:00:13 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqCkm3sovDtcwmwFNhmJxw4Pl5XRwY765QskVZ3RNF5JZ7qBWQeU8XKdGLKUUwhC66uZ98I X-Received: by 2002:a17:902:5502:: with SMTP id f2-v6mr7473520pli.108.1526259613217; Sun, 13 May 2018 18:00:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526259613; cv=none; d=google.com; s=arc-20160816; b=Iac4MtPzj3nMsJV3qlLz4YEh7EbbNrRNV6WqhL8meRJI62rv6hjIrhBWOu+O9MKKTS 5NY5ghOeuJCn2CKrC03By6xJ862oxwySB/7Rtm/Hbm1nNJns5AQwGg2IuodfGbHCifkL 8wEtNw73X4sfT+pYuUBDhnC96eHu2nNqPH7VoIa0J0qnXd3JlzRhdGCJQKW/P5aPp65X N82894u6KMSCLvkWti+oMnnA/cZhFNiC0GK62KpaovM0Dg5ffguXuSqpplYC05+DxM+1 6W33YAdUrZuUzFL2mdaDhrxJQl83NK6/e8TwDraCsxoedZJwdR9HPOC+DbaW0LfXEdHj EeUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :content-language:references:message-id:in-reply-to:subject:cc:to :from:date:arc-authentication-results; bh=abj0xzoNMUoE5zLmHeeqo+kzqolEkgrR9Ew7UvkCdDo=; b=NMp5TMWFjCk4RijKFTHZjW5ERDepGMGMzgHyNxKCZAOag8RA1LsOcdBnOYZhYzPuzn Eg0nwDVPMPyxXUjGQHl2/iFG4m6/tczAcJ7+Iq4oIafP9Hl3yXnKHVYmfudp+vyGh2R7 L1i5Vi/7HqV2qtJoXdaFhc4+/Z+eTr1EXgB57kuWbZn7gpRTvpXGc7IYOiWRHjqGngG3 cKgrQAG5oQe22S0G6pTKzL1CMHBOWmi545X7GLjytSB03jaoGbJJ1kinDP5c4GH40IMU pnt5al/Pa5MzFn1ZQrGpgwrn1teNt4D1b8QHuXDXWdHAIB/9697YxcIndnhe7pff56hp O3KA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q3-v6si6612774pgp.95.2018.05.13.17.59.58; Sun, 13 May 2018 18:00:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752043AbeENA6R convert rfc822-to-8bit (ORCPT + 99 others); Sun, 13 May 2018 20:58:17 -0400 Received: from static-87-79-237-121.netcologne.de ([87.79.237.121]:47938 "EHLO herc.mirbsd.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751533AbeENA6P (ORCPT ); Sun, 13 May 2018 20:58:15 -0400 Received: from herc.mirbsd.org (tg@herc.mirbsd.org [192.168.0.82]) by herc.mirbsd.org (8.14.9/8.14.5) with ESMTP id w4E0o7EZ015654 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 14 May 2018 00:50:09 GMT Date: Mon, 14 May 2018 00:50:07 +0000 (UTC) From: Thorsten Glaser X-X-Sender: tg@herc.mirbsd.org To: "Theodore Y. Ts'o" cc: Adrian Bunk , Ben Hutchings , Debian release team , Debian kernel maintainers , krb5@packages.debian.org, libbsd@packages.debian.org, systemd@packages.debian.org, Michael Kerrisk , linux-kernel@vger.kernel.org Subject: Re: Fixing Linux getrandom() in stable In-Reply-To: <20180514003034.GI14763@thunk.org> Message-ID: References: <75577b3d2efd01aaf563f1a1400a2c655556b258.camel@decadent.org.uk> <20180513204828.GI10643@localhost> <20180514003034.GI14763@thunk.org> Content-Language: de-DE-1901, en-GB X-Message-Flag: Your mailer is broken. Get an update at http://www.washington.edu/pine/getpine/pcpine.html for free. MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=utf-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Theodore Y. Ts'o dixit: >that problems helps most of our users, and we shouldn't let the >perfect be the enemy of the good. Agreed. Start small, then enhance one bootloader at a time. Or boot protocol, I assume. >Also note that the bootloader has depend on userspace to refresh the >seed entropy, both in early boot (in case the syscrashes), and at >shutdown (so the entropy captured while the system is running can be Definitely! >saved as seed entropy). And this is trickier in Linux because the >bootloader lives in a different source tree, and is maintained by >different people from the systemd and/or initscripts people, and for Yes, unfortunately. >that matter the bootloader doesn't know which distribution it is But in this case, the distribution can tell the bootloader the path to the file to load. >the *BSD's has its advantages. And this is where perhaps Debian as a >distribution can solve this problem by coordinating action across >multiple Debian packages.) Of course. >The *point* is that we can't really make a turn-key solution which >will work for everyone. For as much we have the desire for a >"Universal OS", something that works for all hardware, all users, and >all workloads, is probably just not attainable here. As Debian, we can try to come close, but, as you said, don’t let the perfect be the enemy of the good. Perhaps there are multiple somethings that, together (or having the local admin choose) can help more people than one simple solution, even if the latter may help a majority. (I’m a fan of minorities, in case you couldn’t tell. I run an x32 system, after all, and helped out m68k a bit…) >(It never was a complete solution, BTW; even before the patches to >address CVE-2018-1108, there were already hardware systems where you >couldn't count on the RNG being initialized in time and getrandom(2) Another question is what it means that the RNG is initialised. It all depends on what in the end boils down to guesswork, although I tip my hat because that RNG code of yours, both the Linux and the BSD version, are pretty impressive. But the point here is that, even if the RNG thinks it’s fully initialised, it may not be “good” yet, depending on circumstances. (Again, it should not stop us from trying.) bye, //mirabilos -- Solange man keine schmutzigen Tricks macht, und ich meine *wirklich* schmutzige Tricks, wie bei einer doppelt verketteten Liste beide Pointer XORen und in nur einem Word speichern, funktioniert Boehm ganz hervorragend. -- Andreas Bogk über boehm-gc in d.a.s.r