Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is jitterentropy-rngd daemon and/or jitterentropy_rng.k kernel module still useful in modern kernels? #27

Open
adrelanos opened this issue Jul 3, 2022 · 14 comments

Comments

@adrelanos
Copy link

Due to QubesOS/qubes-issues#4169 (comment) I was hoping I could ask something very specific.

  1. Is jitterentropy-rngd daemon still useful recent kernel versions? Would you recommend security-focused operating systems to install the jitterentropy-rngd package by default?

  2. Is jitterentropy_rng.ko kernel module still useful with recent kernel versions? Would you recommend security-focused operating systems to built the jitterentropy_rng.ko statically in the kernel?

  3. Do you have other suggestions of steps that security-focused operating systems could realistically take to improve kernel entropy quality, security?


  • What is "realistic": Pre-configuration changes; package default installation; kernel modules loading, kernel compilation configuration.
  • What is "unrealistic" (for the one asking): Maintaining a fork of the Linux kernel, a huge scope project such as lrng with lots of research, development and unfortunately also Linux kernel politics works required.

To allow this post to age well... What could be considered a recent kernel version at time of writing? Let's say 5.18.5.

@smuellerDD
Copy link
Owner

smuellerDD commented Jul 3, 2022 via email

@krishjainx
Copy link

@smuellerDD Hi, sorry, I don't understand what you mean by "So, for /dev/random without additional patches it is of no use." could you please elaborate? In addition, would it be possible to provide a dkms configuration so the module could rebuild against new kernel sources on kernel upgrades. Thank you !

@smuellerDD
Copy link
Owner

smuellerDD commented Jul 25, 2022 via email

@krishjainx
Copy link

Ah @smuellerDD . Thank you I understand. So I'm using Fedora and would love to test this project and add more entropy to the kernel. I set random.trust_cpu=off. Now how could I securely and "correctly" (never worked with entropy before) add more entropy to the kernel? This could also help other beginners to entropy and could be added to the wiki. Thanks!

Best Regards

@smuellerDD
Copy link
Owner

smuellerDD commented Aug 12, 2022 via email

@krishjainx
Copy link

Thanks. Ah, so https://packages.debian.org/unstable/jitterentropy-rngd is derived from this repo?

@krishjainx
Copy link

And then in Fedora according to https://src.fedoraproject.org/rpms/jitterentropy-rngd/blob/rawhide/f/dead.package I instead do dnf install -y rng-tools && systemctl enable --now rngd since it says "Functionality merged into rng-tools, including a Provides: for this package name"?

@smuellerDD
Copy link
Owner

smuellerDD commented Aug 14, 2022 via email

@smuellerDD
Copy link
Owner

smuellerDD commented Aug 14, 2022 via email

@SanjeetKaranSingh
Copy link

Hi @smuellerDD,
I have latest rng-tools installed, should I still install jitterentropy-rngd to improve entropy collection ?

@smuellerDD
Copy link
Owner

smuellerDD commented Dec 12, 2022 via email

@nisbet-hubbard
Copy link

@smuellerDD, could you please comment on whether changes leading to no good way to insert entropy into kernel by rngd nhorman/rng-tools#195 (comment) affects jitterentropy-rngd in the same way?

@smuellerDD
Copy link
Owner

smuellerDD commented Jun 13, 2023 via email

@nisbet-hubbard
Copy link

Many thanks for clarifying, Stephan!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants