Theodore Ts'o 48d6be955a random: limit the contribution of the hw rng to at most half
For people who don't trust a hardware RNG which can not be audited,
the changes to add support for RDSEED can be troubling since 97% or
more of the entropy will be contributed from the in-CPU hardware RNG.

We now have a in-kernel khwrngd, so for those people who do want to
implicitly trust the CPU-based system, we could create an arch-rng
hw_random driver, and allow khwrng refill the entropy pool.  This
allows system administrator whether or not they trust the CPU (I
assume the NSA will trust RDRAND/RDSEED implicitly :-), and if so,
what level of entropy derating they want to use.

The reason why this is a really good idea is that if different people
use different levels of entropy derating, it will make it much more
difficult to design a backdoor'ed hwrng that can be generally
exploited in terms of the output of /dev/random when different attack
targets are using differing levels of entropy derating.

Signed-off-by: Theodore Ts'o <tytso@mit.edu>
2014-08-05 16:41:50 -04:00
..
2014-05-06 13:05:00 -07:00
2014-04-16 14:31:13 -07:00
2014-06-03 23:12:27 +02:00
2013-05-05 00:11:29 -04:00
2013-02-22 23:31:31 -05:00
2013-02-22 23:31:31 -05:00
2013-05-05 00:12:29 -04:00
2013-05-05 00:12:29 -04:00
2014-07-09 16:45:36 -07:00
2014-04-16 14:21:06 -07:00
2013-12-18 16:39:54 -08:00
2012-11-21 12:55:19 -08:00
2011-03-31 11:26:23 -03:00
2013-12-19 15:10:49 +01:00
2013-02-22 23:31:31 -05:00
2012-03-28 18:30:03 +01:00
2012-10-07 07:22:32 -07:00
2013-02-22 23:31:31 -05:00
2011-01-10 08:51:44 -08:00
2013-02-22 23:31:31 -05:00
2013-10-16 12:36:10 -07:00
2014-04-16 14:21:06 -07:00