Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3634036pxu; Mon, 30 Nov 2020 07:15:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJw7PxMW47cbCt/RtSmTPvrMaUFJ0MmKv3adZwsddFryzjVGwVrKq/NssY/SrWd3jAr9F14L X-Received: by 2002:a17:906:e082:: with SMTP id gh2mr21092987ejb.406.1606749336526; Mon, 30 Nov 2020 07:15:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606749336; cv=none; d=google.com; s=arc-20160816; b=j9z4Sb3xz3nuJlVEv3IBpQM/B4NxXPtibh1HPdjorAeiXp95OAoTTet6G0judjEyQ/ s+pwHAg1pHOoltBiZaVm9k6B/SbuKB72NxLnM97z0tTxij5nFEbU6VTkqFrplo/ZpYX8 qEYMe0aZ170v1WAwvET+MGb9qeoI9Pb3D6VQpDWPXjpIwtlPUAtm9Ea0K7zu4Tq0r3Zl PyVA0T6IjW3Ai7Wxy/uZ0tJgwa/f/RxGoskQIj+fs6ZzCPjUGeFjC6NKfPOND3kfGo/N a8ITXMt4PlUbh826p2mOPC55PWdgcLwj+rqrSClGuw2s/P0DUk/62HItlZQW4h6swHrT MZgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:content-disposition:mime-version :message-id:subject:cc:to:from:date; bh=ClIKItdurnbk1BG7jkuXP1LOuVxxQEOZ/5C6TzXvd0Q=; b=vujZhFGpNnewpx5Ifom0KMLf7geRbHJUah86+oDRBEH3ltdKJKHYSeA9Rw73pMnTE5 z/6mVFI7gnZS1g/eKyDpgPe2XxuB0cb2LBlNAlxmKpHnbP+1Rxf58zVi2v5ss+x5HnEO ainyJpR2WdI5vO5GGluXI9fqcZRvQjGMTL5m+IQAdBXJQg/3SF1zk6ehBCSHalcBQ2sX +CS3esfzglZNSkVy6uW6W4u5Y5kV1LwDt4tcJ0etX5MJxKdvdinGb0CkuoPF1cyObJCw 1oOM28WQWrh+t6Dm97PLKrV3IozmyzwuQJcI9q67do6aUgSn1fIbbCAOJL809UN+Ma1q GbuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si5491094eje.288.2020.11.30.07.14.58; Mon, 30 Nov 2020 07:15:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726827AbgK3PNQ (ORCPT + 99 others); Mon, 30 Nov 2020 10:13:16 -0500 Received: from verein.lst.de ([213.95.11.211]:44748 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725899AbgK3PNQ (ORCPT ); Mon, 30 Nov 2020 10:13:16 -0500 Received: by verein.lst.de (Postfix, from userid 2005) id 3702A6736F; Mon, 30 Nov 2020 16:12:32 +0100 (CET) Date: Mon, 30 Nov 2020 16:12:32 +0100 From: Torsten Duwe To: Linus Torvalds Cc: "Theodore Y. Ts'o" , Stephan =?utf-8?Q?M=C3=BCller?= , Willy Tarreau , linux-crypto@vger.kernel.org, Nicolai Stange , LKML , Arnd Bergmann , "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Peter Matthias , Marcelo Henrique Cerri , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter , And y Lavr , Eric Biggers , ardb@kernel.org, "Jason A. Donenfeld" , Petr Tesarik , simo@redhat.com Subject: drivers/char/random.c needs a (new) maintainer Message-ID: <20201130151231.GA24862@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.17 (2007-11-01) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Linus! AFAIK it's legit to bother you directly with issues like this one? I see certifications as the mere messengers here which tell us that our /dev/random is technologically outdated. Input entropy amounts are guesstimated in advance, obviously much too conservatively, compiled in and never checked thereafter; the whitening is done using some home- grown hash function derivative and other non-cryptographic, non-standard operations. All of this does not affect the Linux kernel directly, it will compile happily, and will run smoothly with all given crypto apps. Only new crypto keys are generated slower than necessary or, much worse, might contain less entropy than required because something broke down unnoticed. In that case, problems would arise only much later, but in the real world and with much graver impact. I would rather like to see the Linux /dev/random being reliable, whether certified or not. If it provided that reliable entropy fast that would be even cooler. If it was at least possible to get approval from a standardization body (without forcing this onto all users, of course) that would be optimal. Meanwhile there's quite a maintenance backlog; minor fixes are pending, medium-sized cleanups are ignored and major patch sets to add the missing features are not even discussed. (I'm deliberately not including links here to avoid excessive finger pointing.) I'd like to believe that Ted is too busy working on ext4, but, especially on explicit request, a "hold on, I'm busy, will get at it later" or "right, someone wants to take over?" would be appropriate IMHO. It is also not helpful to object to or ignore all changes which might benefit certifications just for that sole reason and because of personal aversion. No reply at all yields exactly the same result as having no maintainer at all, hence the subject. Could you please try to get a definite answer from him? I know there is at least one person (probably more) with enough enthusiasm and expertise who would happily take over, should that turn out to be a problem. Thanks, Torsten