Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2105920imm; Thu, 19 Jul 2018 13:17:59 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdhBZ+tuwaw7+cBtcYDc3Mbxqtqlfe5Cta+5gSKHaRmcsmw7lZGbRioJJVKaQT+4+jFnKcj X-Received: by 2002:a17:902:b612:: with SMTP id b18-v6mr11322553pls.131.1532031479369; Thu, 19 Jul 2018 13:17:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532031479; cv=none; d=google.com; s=arc-20160816; b=Ch0KlFIOENijb5hN+i1sDo9KfkLhf35JyzSmQbB974h7AkqFWYZ5Q9g471qRMhgfRY Jk3i/7k//MysLBaGFQEarYwUMkVQ+MysrkG+7fm7SqS+vNYMZcXCu1BIMUmt9mM69rau XqnChMfrDDRHdKo5kT0EYMSUNknFeah+b205BejVSALMO0rjaqq6DNn4a446WNKV6goz p5olmW/aQKSv444LE7f9uqEQXcscevYNuUFPxiYXu4TB+uSA/Qbe+32X8RJ1L2CDBJSU kBNMC4S47Cqgh2BlrFu2EAUnkJJg6EL7rZRCL2dm6nwOO0DBjoT8x7Kbvn2mhkm1lIq2 XbMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :mime-version:organization:references:in-reply-to:date:cc:to:from :message-id:arc-authentication-results; bh=+S/j+Rsz6jGsxvcp/1HYej9WZMrSKYsq7tNelf1H7JI=; b=v1aXnpG5Iw2IYXbvMh5LhsB6bkSqePmi2oUp5/AXlN/siHooQ4GRBYGa8MpMgm+UvB 2p7YTVR7lN/F8xfe5Zrc1FfARxOoPpbSrHu+StiWdEobYq5rvSVTUa+TchS/aPVYR8qx lDcqANav9xfCH0FqC5drQgHLVuBegOzNimKDcsJb1/e3J2IYQAZ4Cf65U83axP1wY86x 5MZBS/uEkCSrXmrFH5McYWOh6tJBk28rAmHVH1eh8xoD4Dt5Cm7tr9ijtRJEPiwoJ45T 3357tJZ/f0d3QGTCz8t17bnvRBoqfgoEBVFb9CxP/xGmdYvjlIpiCoSDQnAwvRddbryn 7WQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 26-v6si70665pgo.169.2018.07.19.13.17.43; Thu, 19 Jul 2018 13:17:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730255AbeGSVBx (ORCPT + 99 others); Thu, 19 Jul 2018 17:01:53 -0400 Received: from ou.quest-ce.net ([195.154.187.82]:33943 "EHLO ou.quest-ce.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726519AbeGSVBx (ORCPT ); Thu, 19 Jul 2018 17:01:53 -0400 Received: from [2a01:e35:2e9f:6cb0:857c:11e6:3194:d53d] (helo=test.quest-ce.net) by ou.quest-ce.net with esmtpsa (TLS1.1:RSA_AES_256_CBC_SHA1:256) (Exim 4.80) (envelope-from ) id 1fgFMJ-000APw-Qi; Thu, 19 Jul 2018 22:17:09 +0200 Message-ID: <437d334a02acf3eff96a4f4da6079829f1de1197.camel@opteya.com> From: Yann Droneaud To: "Theodore Y. Ts'o" , Sandy Harris Cc: Linux Crypto Mailing List , Linux Kernel Developers List , labbott@redhat.com Date: Thu, 19 Jul 2018 22:17:03 +0200 In-Reply-To: <20180718173621.GC30706@thunk.org> References: <20180718014344.1309-1-tytso@mit.edu> <20180718015154.GE3489@thunk.org> <20180718173621.GC30706@thunk.org> Organization: OPTEYA Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.3 (3.28.3-1.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2a01:e35:2e9f:6cb0:857c:11e6:3194:d53d X-SA-Exim-Mail-From: ydroneaud@opteya.com X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ou.quest-ce.net X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00, URIBL_BLOCKED autolearn=ham version=3.3.2 Subject: Re: [PATCH] random: addu a config option to trust the CPU's hwrng X-SA-Exim-Version: 4.2.1 (built Mon, 26 Dec 2011 16:24:06 +0000) X-SA-Exim-Scanned: Yes (on ou.quest-ce.net) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Le mercredi 18 juillet 2018 à 13:36 -0400, Theodore Y. Ts'o a écrit : > For those people who are super paranoid and want a "true random > number generator" (and the meaning of that is hazy) because a > CRNG is Not Enough, my recommendation these days is that they get > something like an open hardware RNG solution, such as ChaosKey from > Altus Metrum[1]. > > [1] https://altusmetrum.org/ChaosKey/ > I could suggest "Infinite Noise" [1] keys which are also open hardware. They use a different design, based on "modular multiplication" which should be immune to most RF noise, The original model is currently sold out[2] but a fork exists[3]. One can also have a look at OneRNG [4][5] which uses a more usual design but adds a nice EMI shield protection. [1] https://github.com/waywardgeek/infnoise [2] https://www.tindie.com/products/WaywardGeek/infinite-noise-true-random-number-generator/ [3] https://www.tindie.com/products/manueldomke/infinite-noise-trng-true-random-number-generator/ [4] http://onerng.info/ [5] http://moonbaseotago.com/onerng/ Regards. -- Yann Droneaud OPTEYA