On Tue 2019-03-05 18:48:11 +0100, Santiago Vila wrote:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907191

ugh :(

> I'll take a look at the kernel feature to see if it's better than this.

fwiw, the change isn't in the kernel -- it's in how userspace talks to
the kernel to get its entropy.  On the Linux kernel, gcrypt 1.8.4
(finally) decided to use the getrandom() syscall when available, rather
than talking to /dev/random, so that should fix everything that uses
libgcrypt for random numbers.  So even after the upgrade of gcrypt, it's
possible that other tools are accessing /dev/random via another method,
and they won't be fixed.

I think the right thing to do in those cases is actually to change those
tools to use getrandom() as well. If you've got a list of packages whose
builds fail when /dev/random is blocked, i'd love to see it -- do you
have a list of those bugs other than this one and #850269?  This
misbehavior is a good hint for where we need to look in the ecosystem to
fix things.  Even better if we could have a special kernel-provided
character device that (by analogy with /dev/zero, /dev/full, or
/dev/null) always blocks indefinitely, then we could just create it as
/dev/random and rebuild the archive to see which packages hang.

For anyone following along on this bug, I recommend reading random(7)
for an overview of the differences between sources of kernel-level
entropy.

        --dkg

Attachment: signature.asc
Description: PGP signature

Reply via email to