Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

swtpm: Check for good entropy source in chroot environment #907

Merged
merged 1 commit into from
Sep 19, 2024

Conversation

stefanberger
Copy link
Owner

Very old OpenSSL versions (e.g., 1.1.0i) are using /dev/urandom to get entropy while newer ones are using the getrandom syscall that does not need the device file. In some environments access to the created /dev/urandom device file may not work (EACCESS; chroot test case) and then OpenSSL will start failing operations that depend on good entropy. Therefore, check the status of the random number generator after chroot.

Very old OpenSSL versions (e.g., 1.1.0i) are using /dev/urandom to get
entropy while newer ones are using the getrandom syscall that does not
need the device file. In some environments access to the created
/dev/urandom device file may not work (EACCESS; chroot test case) and
then OpenSSL will start failing operations that depend on good entropy.
Therefore, check the status of the random number generator after chroot.

Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
@stefanberger stefanberger merged commit 6b1112a into master Sep 19, 2024
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant