Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3928059pxk; Tue, 22 Sep 2020 06:24:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMbd8vScakqSZovVZ1aSa/tIQrAlluRqCguHcQ6qoxjf8Rr4wxBLMtd4FU8nc7+IZTIcOj X-Received: by 2002:a17:907:728e:: with SMTP id dt14mr4717870ejc.505.1600781064948; Tue, 22 Sep 2020 06:24:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600781064; cv=none; d=google.com; s=arc-20160816; b=0P9ZioH/wvc34f4kzYJG2qABDGHqstmyCYllm/47raG3syGiVqCJ3um8zNJYQOAxIq Ox0HMMpPOjgnWTI/anT67H+hN6whCjoteGVrifvWp3Au0ukY7tQF267nI2sS6S9/4MmY 91yxsFtrTIFxfprIbtNMlnNgPZmaLnsPxrzqJQIdMZCsfSHcERe/5p6XlbCs334WBhd/ le0U0VABW5p9o8MJDbe2wLGA9nob8j5P6fqiKrdP+xr3joCKWH7Tf/T/fwYC55/Ivmaf zjijWqF6LVvd55V2ERqe8BaPdIzqOaF5Zfm1b6Qi0mOWVLLS4DoN8cItfYPIIUo+j0Zc btZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=cMuTw1Hr5qEJHQ4hPA0SWVcgBpdQ2KoZlNVUUsp+8B8=; b=qyMhg446L7sP2baVmqlE4yKPeIy/uVMhuhok91g4ye+wqjNM64s+DYDS59lNavP75U O8sYud23JyYQY+dvx9+YDRQl53wKgk29kXMyJHmMYPF/r3XOowfCKAknLYLuzhBW7n0A e+ITEgGY/AE0joyyup/Pfp0ifKTBYhe4M+usaA+zDaS2JV47kV2l9NuwiNdkeVBnltnB lb/nefdgUzRTPWmNmj/Nvf5nGK7zaWTjcLUyhNlEQKNBCa5705ICQoImXhB57ktGzm4J tDoHcEkBlaidENJXcbdEFaxdRByJNBwDs1tUy/463kLQeJyWoM/OL9wEp/+sKATAUOkg 9law== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yh22si13421713ejb.421.2020.09.22.06.23.54; Tue, 22 Sep 2020 06:24:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726489AbgIVNXv (ORCPT + 99 others); Tue, 22 Sep 2020 09:23:51 -0400 Received: from verein.lst.de ([213.95.11.211]:44626 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726470AbgIVNXv (ORCPT ); Tue, 22 Sep 2020 09:23:51 -0400 Received: by verein.lst.de (Postfix, from userid 2005) id A38CE68B02; Tue, 22 Sep 2020 15:23:45 +0200 (CEST) Date: Tue, 22 Sep 2020 15:23:44 +0200 From: Torsten Duwe To: Stephan Mueller Cc: "Theodore Y. Ts'o" , Nicolai Stange , linux-crypto@vger.kernel.org, LKML , Arnd Bergmann , Greg Kroah-Hartman , "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , Willy Tarreau , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Peter Matthias , Marcelo Henrique Cerri , Roman Drahtmueller , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter , Andy Lavr , Eric Biggers , "Jason A. Donenfeld" , Petr Tesarik Subject: Re: [DISCUSSION PATCH 00/41] random: possible ways towards NIST SP800-90B compliance Message-ID: <20200922132344.GA2728@lst.de> References: <20200921075857.4424-1-nstange@suse.de> <8618155.4vTCxPXJkl@tauon.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8618155.4vTCxPXJkl@tauon.chronox.de> User-Agent: Mutt/1.5.17 (2007-11-01) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Sep 21, 2020 at 10:40:37AM +0200, Stephan Mueller wrote: > Am Montag, 21. September 2020, 09:58:16 CEST schrieb Nicolai Stange: > > > - people dislike the approach of having two competing implementations for > > what is basically the same functionality in the kernel. > > Is this really so bad considering the security implications on this topic? We > also have multiple file systems, multiple memory allocators, etc... Exactly. I thought Linux was about the freedom of choice. Some people choose to get a FIPS certification for their Linux-based products, which mostly means to restrict crypto capabilities to an "allowed" set, granted. But in this case people might opt for some sort of "entropy QA". I find it hard to accept that this option is suppressed, especially if it's because of personal antipathy of the maintainer about the origin of this change and not for technical reasons. Restrictions on cryptographic functionality are ok, but health tests on entropy sources are not? I do understand people's reluctance after the dual-ECC DRBG desaster, but OTOH SElinux is generally considered an improvement. Definitely not everything coming from that direction is tainted. A big portion of this patch set is cleanup, another one said introduction of entropy source monitoring. This is important, no matter what your attitude towards certifications might be. Torsten