Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-08-03 Thread Pavel Machek
On Thu 2014-07-31 10:06:37, Bernd Petrovitsch wrote: > On Don, 2014-07-31 at 00:18 +0200, Pavel Machek wrote: > > On Wed 2014-07-30 16:40:52, Bernd Petrovitsch wrote: > > > On Mit, 2014-07-30 at 07:56 -0600, Bob Beck wrote: > > > > Pavel. I have bit 'ol enterprise daemon running with established fi

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-31 Thread Bernd Petrovitsch
On Don, 2014-07-31 at 00:18 +0200, Pavel Machek wrote: > On Wed 2014-07-30 16:40:52, Bernd Petrovitsch wrote: > > On Mit, 2014-07-30 at 07:56 -0600, Bob Beck wrote: > > > Pavel. I have bit 'ol enterprise daemon running with established file > > > descriptors serving thousands of connections > > > w

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-30 Thread Pavel Machek
On Wed 2014-07-30 16:40:52, Bernd Petrovitsch wrote: > On Mit, 2014-07-30 at 07:56 -0600, Bob Beck wrote: > > Pavel. I have bit 'ol enterprise daemon running with established file > > descriptors serving thousands of connections > > which periodically require entropy. Now I run out of descriptors.

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-30 Thread Bernd Petrovitsch
On Mit, 2014-07-30 at 07:56 -0600, Bob Beck wrote: > Pavel. I have bit 'ol enterprise daemon running with established file > descriptors serving thousands of connections > which periodically require entropy. Now I run out of descriptors. I > can't establish new connections. but I should > now halt

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-30 Thread Bob Beck
Pavel. I have bit 'ol enterprise daemon running with established file descriptors serving thousands of connections which periodically require entropy. Now I run out of descriptors. I can't establish new connections. but I should now halt all the other ones that require entropy? I should raise SIG

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-30 Thread Pavel Machek
Hi! > The rationale of this system call is to provide resiliance against > file descriptor exhaustion attacks, where the attacker consumes all > available file descriptors, forcing the use of the fallback code where > /dev/[u]random is not available. Since the fallback code is often not > well-te

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-22 Thread Rolf Eike Beer
> EAGAIN The requested entropy was not available, and the > getentropy(2) would have blocked if GRND_BLOCK flag > was set. I think either "and the call to getentropy(2)" or "and getentropy(2)" here. Greetings, Eike -- To unsubscribe from

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-21 Thread Theodore Ts'o
On Mon, Jul 21, 2014 at 10:21:26PM +0200, Till Smejkal wrote: > Hi, > > On Fri, 18 Jul 2014, Theodore Ts'o wrote: > [...] > > If the GRND_RANDOM bit is not set, then the /dev/urandom pool > > will be used. Unlike using read(2) to fetch data from > > /dev/urandom, if the urandom pool h

Re: [PATCH -v4] random: introduce getrandom(2) system call

2014-07-21 Thread Till Smejkal
Hi, On Fri, 18 Jul 2014, Theodore Ts'o wrote: [...] > If the GRND_RANDOM bit is not set, then the /dev/urandom pool > will be used. Unlike using read(2) to fetch data from > /dev/urandom, if the urandom pool has not been sufficiently > initialized, getrandom(2) will block

[PATCH -v4] random: introduce getrandom(2) system call

2014-07-18 Thread Theodore Ts'o
The getrandom(2) system call was requested by the LibreSSL Portable developers. It is analoguous to the getentropy(2) system call in OpenBSD. The rationale of this system call is to provide resiliance against file descriptor exhaustion attacks, where the attacker consumes all available file descr