package/urandom-scripts: actually credit seed files via seedrng
The RNG can't actually be seeded from a shell script, due to the reliance on ioctls. For this reason, Busybox 1.36.0 contains SeedRNG, a tiny program meant to be called at startup and shutdown (and at arbitrary other points in between if desired). Note that initially, the way seedrng was included in busybox broke things quite severely, but now it's been reverted to a reasonably acceptable version. This is a significant improvement over the current init script, which doesn't credit entropy and whose hashing in shell scripts is sort of fragile. Because seedrng is part of busybox, urandom-scripts now depends on BR2_PACKAGE_BUSYBOX. This can be removed again if later we add a standalone seedrng package. Add a decent explanation to the init script about the need for a persistent directory to make this actually work. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> [Arnout: - Remove busybox patch, it's now part of busybox 1.36.0. - Depend on busybox. - Fix shellcheck errors. - Use DAEMON and SEEDRNG_ARGS. - Don't bother with "seed_dir" and "skip_credit" variables. - Rename to S20seedrng. ] Signed-off-by: Arnout Vandecappelle <arnout@mind.be>
This commit is contained in:
parent
7231701a29
commit
4a6f9d2516
@ -1,10 +1,7 @@
|
||||
config BR2_PACKAGE_URANDOM_SCRIPTS
|
||||
bool "urandom-initscripts"
|
||||
default y if BR2_PACKAGE_INITSCRIPTS
|
||||
depends on BR2_PACKAGE_BUSYBOX
|
||||
depends on !BR2_PACKAGE_SYSTEMD
|
||||
help
|
||||
Initscript to preserve the random seed between reboots.
|
||||
|
||||
WARNING: this is a poor fit to try and get high-quality
|
||||
entropy at boot. There are better ways, like haveged, or
|
||||
rng-tools.
|
||||
|
40
package/urandom-scripts/S20seedrng
Normal file
40
package/urandom-scripts/S20seedrng
Normal file
@ -0,0 +1,40 @@
|
||||
#! /bin/sh
|
||||
#
|
||||
# Preserve the random seed between reboots. See urandom(4).
|
||||
#
|
||||
# This script can be called multiple times during operation (e.g. with
|
||||
# "reload" argument) to refresh the seed.
|
||||
|
||||
# The following arguments can be added to SEEDRNG_ARGS in
|
||||
# /etc/default/seedrng:
|
||||
# --seed-dir=/path/to/seed/directory
|
||||
# Path to the directory where the seed and the lock files are stored.
|
||||
# for optimal operation, this should be a persistent, writeable
|
||||
# location. Default is /var/lib/seedrng
|
||||
#
|
||||
# --skip-credit
|
||||
# Set this to true only if you do not want seed files to actually
|
||||
# credit the RNG, for example if you plan to replicate this file
|
||||
# system image and do not have the wherewithal to first delete the
|
||||
# contents of /var/lib/seedrng.
|
||||
#
|
||||
# Example:
|
||||
# SEEDRNG_ARGS="--seed-dir=/data/seedrng --skip-credit"
|
||||
#
|
||||
|
||||
DAEMON="seedrng"
|
||||
SEEDRNG_ARGS=""
|
||||
|
||||
# shellcheck source=/dev/null
|
||||
[ -r "/etc/default/$DAEMON" ] && . "/etc/default/$DAEMON"
|
||||
|
||||
case "$1" in
|
||||
start|stop|restart|reload)
|
||||
# Never fail, as this isn't worth making a fuss
|
||||
# over if it doesn't go as planned.
|
||||
# shellcheck disable=SC2086 # we need the word splitting
|
||||
seedrng $SEEDRNG_ARGS || true;;
|
||||
*)
|
||||
echo "Usage: $0 {start|stop|restart|reload}"
|
||||
exit 1
|
||||
esac
|
@ -1,70 +0,0 @@
|
||||
#! /bin/sh
|
||||
#
|
||||
# Preserve the random seed between reboots. See urandom(4).
|
||||
#
|
||||
|
||||
# Quietly do nothing if /dev/urandom does not exist
|
||||
[ -c /dev/urandom ] || exit 0
|
||||
|
||||
URANDOM_SEED="/var/lib/random-seed"
|
||||
|
||||
# shellcheck source=/dev/null
|
||||
[ -r "/etc/default/urandom" ] && . "/etc/default/urandom"
|
||||
|
||||
if pool_bits=$(cat /proc/sys/kernel/random/poolsize 2> /dev/null); then
|
||||
pool_size=$((pool_bits/8))
|
||||
else
|
||||
pool_size=512
|
||||
fi
|
||||
|
||||
init_rng() {
|
||||
[ -f "$URANDOM_SEED" ] || return 0
|
||||
printf 'Initializing random number generator: '
|
||||
dd if="$URANDOM_SEED" bs="$pool_size" of=/dev/urandom count=1 2> /dev/null
|
||||
status=$?
|
||||
if [ "$status" -eq 0 ]; then
|
||||
echo "OK"
|
||||
else
|
||||
echo "FAIL"
|
||||
fi
|
||||
return "$status"
|
||||
}
|
||||
|
||||
save_random_seed() {
|
||||
printf 'Saving random seed: '
|
||||
status=1
|
||||
if touch "$URANDOM_SEED.new" 2> /dev/null; then
|
||||
old_umask=$(umask)
|
||||
umask 077
|
||||
dd if=/dev/urandom of="$URANDOM_SEED.tmp" bs="$pool_size" count=1 2> /dev/null
|
||||
cat "$URANDOM_SEED" "$URANDOM_SEED.tmp" 2>/dev/null \
|
||||
| sha256sum \
|
||||
| cut -d ' ' -f 1 > "$URANDOM_SEED.new" && \
|
||||
mv "$URANDOM_SEED.new" "$URANDOM_SEED" && status=0
|
||||
rm -f "$URANDOM_SEED.tmp"
|
||||
umask "$old_umask"
|
||||
if [ "$status" -eq 0 ]; then
|
||||
echo "OK"
|
||||
else
|
||||
echo "FAIL"
|
||||
fi
|
||||
|
||||
else
|
||||
echo "SKIP (read-only file system detected)"
|
||||
fi
|
||||
return "$status"
|
||||
}
|
||||
|
||||
case "$1" in
|
||||
start|restart|reload)
|
||||
# Carry a random seed from start-up to start-up
|
||||
# Load and then save the whole entropy pool
|
||||
init_rng && save_random_seed;;
|
||||
stop)
|
||||
# Carry a random seed from shut-down to start-up
|
||||
# Save the whole entropy pool
|
||||
save_random_seed;;
|
||||
*)
|
||||
echo "Usage: $0 {start|stop|restart|reload}"
|
||||
exit 1
|
||||
esac
|
@ -5,8 +5,8 @@
|
||||
################################################################################
|
||||
|
||||
define URANDOM_SCRIPTS_INSTALL_INIT_SYSV
|
||||
$(INSTALL) -D -m 0755 $(URANDOM_SCRIPTS_PKGDIR)/S20urandom \
|
||||
$(TARGET_DIR)/etc/init.d/S20urandom
|
||||
$(INSTALL) -D -m 0755 $(URANDOM_SCRIPTS_PKGDIR)/S20seedrng \
|
||||
$(TARGET_DIR)/etc/init.d/S20seedrng
|
||||
endef
|
||||
|
||||
$(eval $(generic-package))
|
||||
|
Loading…
Reference in New Issue
Block a user