Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 92933C433F5 for ; Fri, 10 Dec 2021 06:46:36 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237108AbhLJGuJ (ORCPT ); Fri, 10 Dec 2021 01:50:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33226 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237088AbhLJGuJ (ORCPT ); Fri, 10 Dec 2021 01:50:09 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76780C061746; Thu, 9 Dec 2021 22:46:34 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 283FAB82779; Fri, 10 Dec 2021 06:46:33 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A2908C00446; Fri, 10 Dec 2021 06:46:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1639118791; bh=OtcYWcrE7+fgmYrrmv9WrsJEdx2OzJXkqwY8azLwKO8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=xZsVpqRut1pFnfNfNJrw053jZzC2+bdbamEVFwA2g7V5ZauxQqr8+LjihlsmOpNXA jWeUiDSBiSOVKK1e+1G0w66MH+JyJ9RSZvcgQ7tlGSOqvqPSkVL5l1FodT6xL205lL IqjkfwHsC9D+6hMaTAIkwlpaB/eqxDsZsIaicyeQ= Date: Fri, 10 Dec 2021 07:46:24 +0100 From: Greg Kroah-Hartman To: Marcelo Henrique Cerri Cc: "Jason A. Donenfeld" , Simo Sorce , Jeffrey Walton , Stephan Mueller , Tso Ted , Linux Crypto Mailing List , Willy Tarreau , Nicolai Stange , LKML , Arnd Bergmann , "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Peter Matthias , Eric Biggers , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter , Andy Lavr , Petr Tesarik , John Haxby , Alexander Lobakin , Jirka Hladky Subject: Re: [PATCH v43 01/15] Linux Random Number Generator Message-ID: References: <20211210014337.xmin2lu5rhhe3b3t@valinor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211210014337.xmin2lu5rhhe3b3t@valinor> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, Dec 09, 2021 at 10:43:37PM -0300, Marcelo Henrique Cerri wrote: > Hi, Jason. How do you think we could approach that then? > > Are you willing to discuss the FIPS 140-3 requirements that random.c > doesn't currently meet so we can dive deeper on how we could implement > them in a way that would improve the kernel other then simply > providing compliance to FIPS? Discussing things doesn't usually work well. Let's see some working patches first, that solve problems that you have with the current random code, and we can go from there. Again, like any other kernel patch submission, nothing new here at all. > I believe all the distros are interested in making progress on that, > but without a general guidance it makes very hard for us to > collaborate and we end up in the current situation in which each > distro is carrying its own "hack", as Simo mentioned before. Canonical > is in the same situation as the other distros and we are carrying an > workaround to wire up the crypto DRBG to random.c in order to archive > compliance. If everyone seems to think their patches are hacks, and are not worthy of being submitted, then why do they think that somehow they are viable for their users that are actually using them? {sigh} greg k-h