From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alan Cox Subject: Re: [PATCH] [resend] drivers/net: remove network drivers' last few uses of IRQF_SAMPLE_RANDOM Date: Thu, 29 May 2008 11:49:41 +0100 Message-ID: <20080529114941.099d8e2c@core> References: Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org To: Chris Peterson Return-path: Received: from earthlight.etchedpixels.co.uk ([81.2.110.250]:56102 "EHLO lxorguk.ukuu.org.uk" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751169AbYE2LDi (ORCPT ); Thu, 29 May 2008 07:03:38 -0400 In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: On Wed, 28 May 2008 23:23:26 -0700 (PDT) Chris Peterson wrote: > > Remove network drivers' last few uses of theoretically-exploitable network > entropy. Only 12 net drivers are affected. Headless boxes should use a > more secure source of entropy, such as the userspace daemons rngd, clrngd, > egd, audio_entropyd, and/or video_entroyd. > > I'm also thinking about writing a "Frankenstein" daemon that combines the > entropy-collecting algorithms from those daemons into one. Whereas rngd > only uses /dev/hw_random, my hypothetical daemon would make a best effort > attempt: use /dev/hw_random if it exists, otherwise fallback (or use in > addition) the other entropy sources. > > > Signed-off-by: Chris Peterson Acked-by: Alan Cox