Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp5869529pxu; Wed, 23 Dec 2020 07:28:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJygwFLdcPTCVqWev6EPpfkuyrS0DXfxwsaOK1A4Whg8RlPlcpAjUtL0wzI7uL0Mho0H4M9n X-Received: by 2002:a17:906:ae4e:: with SMTP id lf14mr25309036ejb.310.1608737287154; Wed, 23 Dec 2020 07:28:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608737287; cv=none; d=google.com; s=arc-20160816; b=ginvqB6VFmZfar3OO0xamst8F5fVRjeQ+z8IUID2xtuQyPazwMeIFXshDvWAF54z/O EltPoO49YI1n73msaRbmyiD44qVCaOrqAoEB5Y/qwkcNLJt897YdtC5ywXth3lwdFTNc OVRJGOhXdHXNIi2l6XriDtsqt9VfqSPX9JeZYEjfEJoAiRSmgQX3ojmdqu/WfCMxlyBV 7WEJcogfaXFRyS03rzWX8i4pPIi3jK8qwEEjroMbkZ85zqC1agKf+4y8Pn3ht6l+7Y8r T9KnPVepTbeCk79NdGauSnyPhA46Os0Iu8W++SaNuITykm/10xcBNJu6h0xbotTjq7mH 47wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=GPaKSqAjiz95DFz0fxi4lWiKU6bB5zmTEZkR6+nVG1c=; b=qeUTZjVkta6AlfaISdRTntmBiH/lH6csanQfSpeijaMFeqJY2y3GuHbJIdl4dvw3bU jza7inmluvVlKSMRIMqG1MSUpT9r50DDXML3ckCXivE/zkEhCBZNQz0FONnjD5/C/jIE 8JEMFkbcGR4qJGyJbE3xlLy7OejXv2RJu+NbVvJgzMNxBgKF4xq7l68SJqGnlZUXGURx 3orLEZ45wqJ3NQ6QQsrOl6NbZY3NPWnUWHSMKrGoJMjbMHBiAxmsndXPIexXUVnFynyg IK4gYyiwflNubyQyedLqztdnmsrSkaOmIQbT6gpjf3vAbFtoI3QeTKILrTyPQvMxfjT1 xz9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=es7vzc8y; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a5si4169011ejc.573.2020.12.23.07.27.45; Wed, 23 Dec 2020 07:28:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=es7vzc8y; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727141AbgLWP0Q (ORCPT + 99 others); Wed, 23 Dec 2020 10:26:16 -0500 Received: from mo4-p02-ob.smtp.rzone.de ([85.215.255.82]:35265 "EHLO mo4-p02-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727107AbgLWP0P (ORCPT ); Wed, 23 Dec 2020 10:26:15 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1608737001; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Date:Cc:To:From:Subject:Message-ID:From: Subject:Sender; bh=GPaKSqAjiz95DFz0fxi4lWiKU6bB5zmTEZkR6+nVG1c=; b=es7vzc8y7gbNc+Ea3R0xEEqWexvGwzwSCfeM5STGcWcDWjeckYuXqfnP9gv8kqTT6o CNvVhtbKfUUulQeJUkf0R3r5OhuIXxJulQafmqtdvKDD+MVSfTnjePKSA1SN6YDf5HMd tyky5+/WHAL0JqugZQ+lvrIRxuQbWuTBcC7HPdXTfprDnAqaZyp9SScVaSLfQZXrhR2a yV496X8xe9h+VZLk3xkOClSh9ltrScsLX19jh+8vOZopY9abau7ykt2OogvdgEzXNQIP lEXgIxhtLpq9X8QHAKnF4QmUMsPeWB3UznFAikXOPfd/jNZ0XAp9oaXdfku5zHbxg3Q3 vEIQ== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNzyCzy1Sfr67uExK884EC0GFGHavJSlFkMRfNUE=" X-RZG-CLASS-ID: mo00 Received: from tauon.chronox.de by smtp.strato.de (RZmta 47.10.7 SBL|AUTH) with ESMTPSA id h02bd9wBNFMN0oq (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Wed, 23 Dec 2020 16:22:23 +0100 (CET) Message-ID: Subject: Re: drivers/char/random.c needs a (new) maintainer From: Stephan Mueller To: "Jason A. Donenfeld" , Petr Tesarik Cc: Torsten Duwe , Marcelo Henrique Cerri , "Theodore Y. Ts'o" , Linus Torvalds , Willy Tarreau , Linux Crypto Mailing List , Nicolai Stange , LKML , Arnd Bergmann , "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Peter Matthias , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter , And y Lavr , Eric Biggers , Ard Biesheuvel , simo@redhat.com Date: Wed, 23 Dec 2020 16:22:22 +0100 In-Reply-To: References: <20201130151231.GA24862@lst.de> <20201130165339.GE5364@mit.edu> <20201218132519.kj3nz7swsx7vvlr5@valinor.lan> <20201223132851.55d19271@blackhole.lan> <20201223151014.57caf98b@ezekiel.suse.cz> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.38.2 (3.38.2-1.fc33) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Am Mittwoch, dem 23.12.2020 um 15:32 +0100 schrieb Jason A. Donenfeld: > > I would, however, be interested in a keccak-based construction. But > just using the keccak permutation does not automatically make it > "SHA-3", so we're back at the same issue again. FIPS is simply not > interesting for our requirements. Your requirements? Interesting approach. Using non-assessed cryptography? Sounds dangerous to me even though it may be based on some well-known construction. I thought Linux in general and crypto in particular is about allowing user (or the vendor) to decide about the used algorithm. So, let us have a mechanism that gives them this freedom. Thus the proposed idea sounds to me like a dangerous proposition upon which almost all cryptography shall rest. This will surely invite even more fragmentation. Ciao Stephan PS: This entire discussion is NOT about the crypto side of the random numbers, but about how get the entropy for the random numbers.