> On the BSDs getentropy() is hence unconditionally blocking https://lore.kernel.org/linux-ext4/20190917172824.GB31798@gardel-login/ … Lennart/Linux people still don't get it.. OpenBSD getentropy(2) does not block by design. The same as /dev/urandom. https://man.openbsd.org/random.4 https://man.openbsd.org/getentropy.2
If by "he" you mean Linus, then that's correct. Lennart is actually willing to fix systemd.
-
-
I meant Lennart. My (perhaps mis-) understanding of the situation was that this whole problem arose because systemd insisted on using getrandom for non-cryptographic purposes at early boot, deadlocking the system before entropy pool was initialized.
-
That's how it started, but it has been Linus insisting on making getrandom insecure by default, with some extremely bad takes on crypto: https://lore.kernel.org/linux-ext4/CAHk-=wiGg-G8JFJ=R7qf0B+UtqA_Weouk6v+McmfsLJLRq6AKA@mail.gmail.com/ … https://lore.kernel.org/linux-ext4/CAHk-=wjyH910+JRBdZf_Y9G54c1M=LBF8NKXB6vJcm9XjLnRfg@mail.gmail.com/ … https://lore.kernel.org/linux-ext4/CAHk-=wjM3aEiX-s3e8PnUjkiTzkF712vOfeJPoFDCVTJ+Pp+XA@mail.gmail.com/ … Lennart has been saying don't do that: https://lore.kernel.org/linux-ext4/20190916180801.GB30990@gardel-login/ …
- 12 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
