[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [PATCH] VirtIO-RNG: Update default entropy source to `/
Daniel P . Berrangé
Re: [Qemu-devel] [PATCH] VirtIO-RNG: Update default entropy source to `/dev/urandom`
Thu, 9 May 2019 15:54:47 +0100
On Thu, May 09, 2019 at 02:53:20PM +0100, Stefan Hajnoczi wrote:
> On Fri, May 03, 2019 at 05:46:12PM +0200, Kashyap Chamarthy wrote:
> > When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> > source of entropy, and that source needs to be "non-blocking", like
> > `/dev/urandom`. However, currently QEMU defaults to the problematic
> > `/dev/random`, which is "blocking" (as in, it waits until sufficient
> > entropy is available).
> > So change the entropy source to the recommended `/dev/urandom`.
> Why is /dev/urandom "recommended"?
> I understand the requirement for instant random numbers, but what about
> the concerns about quality? Have you decided that the consumers of
> these random numbers are safe with /dev/urandom?
The current random(4) man page says:
The /dev/random interface is considered a legacy inter‐
face, and /dev/urandom is preferred and sufficient in
all use cases, with the exception of applications which
require randomness during early boot time; for these
applications, getrandom(2) must be used instead,
because it will block until the entropy pool is ini‐
"early boot" is a bit of an ill-defined term here, but I think in
general QEMU can reasonably be said to not be running in early boot.
In any case the newly proposed RNG backend should ultimately become
the preferred choice for mgmt apps:
This new rng-builtin delegates to our crypto random APIs, which are
backed by GNUTLS, libgcrypt, getrandom (or Windows equiv), and
finally /dev/urandom as last ditch effort.
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|