Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp729397ybn; Wed, 2 Oct 2019 05:22:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqyAdZV8c3onqGXJDqu59/XGcf5GHKCcRsdDfJL+OlCdjBKqyU0IjqhpLlb5NBUkwVy8sh2G X-Received: by 2002:a17:906:6445:: with SMTP id l5mr2768182ejn.12.1570018972571; Wed, 02 Oct 2019 05:22:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570018972; cv=none; d=google.com; s=arc-20160816; b=Ej1DNNVAUW6B5OsJpxHkRkQB1N0S6qileiB7LA0ElOeywmDUsDdDvy5eCjD9aT44nC E0o6FsTESomUovR7cp5EflNi+r1QEzRHyH9fnv6WeWteqldgjdZjppCTm1Tk2qYW5cUw Qin7Vwu06IS0FRRvl580ZGh9Qz1QzDfz98EVBIryZ22ir83vOFKpvTOb5p8EARJbd0LI zrkT4rSQQBYMRbbiXpVbcId6zfhfZau1aPFSSOUBEPGrEzs3cY+4sjSyjiOGzvwoUyIP wYFKAw1ixpXmxV9fQ8bq9gSDtCYb1ezplzCNaq0pZLH3u6lt8yr0KxGkmdR3infmv6bI EP5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=wE0Pd2CYybQ3Xmggcy6q6SeOa/tJ4O5xyJwEgLXBB14=; b=JOffkQACeRECFKm6D5yAGHAIu2R59djKFYZMMyVyg4H/MXWlmcHRG3XOUUxI3ia0xk ff713LrvsuWtWIfi0SRm8ydVybd9osCGsMvAtv+k3flv44hjGHofw/WjQ7TQXk7Is2ac M60cRS7sNBm+SYy3MwpGTmIONj75GXC5srvNYt8b6bBrTTETrT9es/vdPleRWkocD/iL yKIDN+wOxOqKqq5Pud2QJETzMjGelBpVGeoRsXxJgjLkwAyDEkMpNRzWwbaSSJgCiV6X mZd3ipJcjtATq8rX5mtNp0wUETWXpr3ugE7tSkUORS/9GQXuAwNa19kAD9lWmZ1gZiSc iAAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z7si12320667edi.318.2019.10.02.05.22.28; Wed, 02 Oct 2019 05:22:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727775AbfJBMBr (ORCPT + 99 others); Wed, 2 Oct 2019 08:01:47 -0400 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:46876 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725875AbfJBMBr (ORCPT ); Wed, 2 Oct 2019 08:01:47 -0400 Received: from callcc.thunk.org (guestnat-104-133-0-98.corp.google.com [104.133.0.98] (may be forged)) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x92C1GcC011091 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 2 Oct 2019 08:01:17 -0400 Received: by callcc.thunk.org (Postfix, from userid 15806) id 0215B42088C; Wed, 2 Oct 2019 08:01:15 -0400 (EDT) Date: Wed, 2 Oct 2019 08:01:15 -0400 From: "Theodore Y. Ts'o" To: "Ahmed S. Darwish" Cc: Linus Torvalds , Thomas Gleixner , a.darwish@linutronix.de, LKML , Nicholas Mc Guire , the arch/x86 maintainers , Andy Lutomirski , Kees Cook Subject: Re: x86/random: Speculation to the rescue Message-ID: <20191002120115.GA13880@mit.edu> References: <20191001161448.GA1918@darwi-home-pc> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20191001161448.GA1918@darwi-home-pc> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 01, 2019 at 06:15:02PM +0200, Ahmed S. Darwish wrote: > > Using the "ent" tool, [2] also used to test randomness in the Stephen > M?ller LRNG paper, on a 500000-byte file, produced the following > results: The "ent" tool is really, really useless. If you take any CRNG, even intialized with a known seed, "ent" will say that it's *GREAT*! If you don't believe me, disable all entropy inputs into the CRNG, initialize it with "THE NSA IS OUR LORD AND MASTER", and then run it. You'll get substantially the same results. (And if we didn't the Cha Cha 20 encryption algorithm would be totally broken). - Ted