FS#34580 - [rng-tools] Default configuration of rng-tools adds no real entropy to /dev/random
Attached to Project:
Community Packages
Opened by blahblah (blahblah) - Wednesday, 03 April 2013, 00:08 GMT
Last edited by Massimiliano Torromeo (mtorromeo) - Monday, 02 March 2015, 18:20 GMT
Opened by blahblah (blahblah) - Wednesday, 03 April 2013, 00:08 GMT
Last edited by Massimiliano Torromeo (mtorromeo) - Monday, 02 March 2015, 18:20 GMT
|
Details
Description:
The default configuration of rng-tools version 4-1 (https://www.archlinux.org/packages/community/i686/rng-tools/) changes the semantics of the Linux /dev/random device through the default configuration. The default rngd.conf adds useless entropy from /dev/urandom (which is entirely generated from the contents of the /dev/random pool itself). I presume this is to prevent blocking of /dev/random. The default configuration (https://projects.archlinux.org/svntogit/community.git/plain/trunk/rngd.conf?h=packages/rng-tools) follows: RNGD_OPTS="-o /dev/random -r /dev/urandom" Many applications which require high quality entropy use /dev/random, and tricking the kernel into believing that high quality entropy is being added is a potential security issue. /dev/random intentionally blocks when no entropy is available, and /dev/random should only be fed with high quality entropy. The default configuration of rngd should not feed useless data to /dev/random. Additional info: * rng-tools version 4-1, rngd.conf configuration file Steps to reproduce: |
This task depends upon
Closed by Massimiliano Torromeo (mtorromeo)
Monday, 02 March 2015, 18:20 GMT
Reason for closing: Fixed
Additional comments about closing: rng-tools-5-2
Monday, 02 March 2015, 18:20 GMT
Reason for closing: Fixed
Additional comments about closing: rng-tools-5-2
And if you have a real entropy device just change the configuration.
It also needs to be explicitly installed AND started/enabled so after installation the system is not any less secure.
By analogy one should deduce that openssh should not exist because if you install it you have a daemon on your system that provides shell access (if you start it) and so the system is less secure than before installation?
You are obviously responsible to configure every service you decide to install and enable on your system.
Other than that, I am not strongly against changing the default configuration of rngd but I don't see the point and on the majority of systems there is no hardware entropy generation module, so at least this configuration always works.
The default configuration certainly always works, but the problem is that it breaks the established behavior of /dev/random.
I am closing this as "not a bug".
FS#43211.