Conversation

This Tweet was deleted by the Tweet author. Learn more
Yeah, and they do use this functionality whether or not it's considered to be trusted based on the configuration option. The trust option is only about whether it's credited as providing entropy. If it's credited, the CSPRNG will be initialized right away and won't need to block.
1
Replying to and
Many environments (embedded, virtual machines) don't provide other good sources of entropy so not crediting the CPU CSPRNG results in getrandom(...) blocking for a long time in early boot. It can stall the booting process for minutes, hours, etc.
1
Replying to and
Crediting it puts full trust in it working properly. It could be AES-CTR based on very poor entropy and it would still appear to be totally fine externally. It could be negligence or cost cutting that results in it not working properly. It doesn't need to be malicious.
1
Replying to and
On a modern desktop / laptop, there's not much advantage to trusting it since there's plenty of other entropy to credit. In many other environments, that's not a reasonable choice. It hurts everyone if projects avoid using getrandom(...) or make it non-blocking with a fallback.
1