Jeff Garzik wrote:
Bill Davidsen wrote:
Herbert Xu wrote:
You missed the point. This has nothing to do with the crypto API.
Jeff is saying that if this is disabled by default, then only a few
users will enable it and therefore use this API.
Since we can't afford to enable it by default as hardware RNG may
fail which can lead to catastrophic consequences, there is no point
for this API at all.
Wait a minute, if it fails the system drops back to software, which is
not as good in a pedantic analysis, but perhaps falls a good bit short
of "catastrophic consequences" as most people would characterize that
phrase. And more to the point, now that many CPUs and chipsets are the
RNG of choice, what is the actual probability of a failure of the RNG
leaving a functional system (that's a real question seeking response
from someone who has some actual data).
As I've said, in the past the Intel RNGs in particular -have- failed,
but the rest of the system keeps on working just fine.
People have been hit by meteors, too. I wasn't questioning that it was
possible in practice, or even that it did happen, but trying to get some
quantitative values for failure rates. I guess that wasn't clear, I know
entropy is scarse on embedded systems, I don't know what the magnitude
of the RNG failure is, so I'm coming from the "router in a cigar box"
point of view.
It probably depends on the hardware implementation; I think the Intel
RNG was based on a thermal diode, or somesuch.
In the cases where an RNG has failed in the past, the system has worked
as expected: rngd stopped feeding data into the entropy pool.
If the hardware RNG always fails to all zeros it should be possible to
detect that it failed with the need for userspace daemons. While true
random bits might legitimately have 10k zeros in a row, I will bet that
if it happens the device isn't working.
I'm assuming that the hardware RNG is only read when a read on
/dev/random occurs and there isn't enough entropy available to satisfy
the read. I realize that may not be true, I just haven't had time to go
study the code.
If the VIA RNG (on-CPU) fails, that's probably indicative of a larger
problem, though.
--
-bill davidsen ([email protected])
"The secret to procrastination is to put things off until the
last possible moment - but no longer" -me
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]