Date: Wed, 8 May 2019 18:21:14 +0200 From: Michael Tuexen <tuexen@fh-muenster.de> To: "Andrey V. Elsukov" <bu7cher@yandex.ru> Cc: freebsd-current <freebsd-current@FreeBSD.org> Subject: Re: random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' returned no entropy. Message-ID: <DC29F07C-AF92-4E03-9C64-5C3FB69A5360@fh-muenster.de> In-Reply-To: <2c1eceb4-08a5-b633-2ce2-c711610db1cb@yandex.ru> References: <2c1eceb4-08a5-b633-2ce2-c711610db1cb@yandex.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] > On 8. May 2019, at 18:13, Andrey V. Elsukov <bu7cher@yandex.ru> wrote: > > Hi, > > today I updated one of my test machines and discovered that message from > the subject periodically printed in the console. Fixed in https://svnweb.freebsd.org/changeset/base/347329 Best regards Michael > > FreeBSD 13.0-CURRENT r347327=4f47587(svn_head) GENERIC-NODEBUG amd64 > FreeBSD clang version 8.0.0 (tags/RELEASE_800/final 356365) (based on > LLVM 8.0.0) > VT(vga): resolution 640x480 > CPU: Intel(R) Xeon(R) CPU E5-2660 v4@ 2.00GHz (2000.04-MHz K8-class CPU) > ... > real memory = 68719476736 (65536 MB) > avail memory = 66722340864 (63631 MB) > Event timer "LAPIC" quality 600 > ACPI APIC Table: <SUPERM SMCI--MB> > FreeBSD/SMP: Multiprocessor System Detected: 28 CPUs > FreeBSD/SMP: 2 package(s) x 14 core(s) > ... > > % grep -c random /var/run/dmesg.boot > 606 > > % grep random /var/run/dmesg.boot | head -10 > __stack_chk_init: WARNING: Initializing stack protection with non-random > cookies! > random: entropy device external interface > random: registering fast source Intel Secure Key RNG > random: fast provider: "Intel Secure Key RNG" > arc4random: WARNING: initial seeding bypassed the cryptographic random > device because it was not yet seeded and the knob > 'bypass_before_seeding' was enabled. > random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' > returned no entropy. > > % sysctl -a | grep -v random_sources_feed | grep rand > kern.fallback_elf_brand: -1 > device random > device rdrand_rng > kern.randompid: 0 > kern.elf32.fallback_brand: -1 > kern.elf64.fallback_brand: -1 > kern.random.fortuna.minpoolsize: 64 > kern.random.harvest.mask_symbolic: > PURE_RDRAND,[UMA],[FS_ATIME],SWI,INTERRUPT,NET_NG,[NET_ETHER],NET_TUN,MOUSE,KEYBOARD,ATTACH,CACHED > kern.random.harvest.mask_bin: 000000010000000111011111 > kern.random.harvest.mask: 66015 > kern.random.use_chacha20_cipher: 0 > kern.random.block_seeded_status: 0 > kern.random.random_sources: 'Intel Secure Key RNG' > kern.random.initial_seeding.disable_bypass_warnings: 0 > kern.random.initial_seeding.arc4random_bypassed_before_seeding: 1 > kern.random.initial_seeding.read_random_bypassed_before_seeding: 0 > kern.random.initial_seeding.bypass_before_seeding: 1 > net.inet.ip.portrange.randomtime: 45 > net.inet.ip.portrange.randomcps: 10 > net.inet.ip.portrange.randomized: 1 > net.inet.ip.random_id_total: 0 > net.inet.ip.random_id_collisions: 0 > net.inet.ip.random_id_period: 0 > net.inet.ip.random_id: 0 > net.key.int_random: 60 > debug.fail_point.status_fill_kinfo_vnode__random_path: off > debug.fail_point.fill_kinfo_vnode__random_path: off > debug.fail_point.status_random_fortuna_pre_read: off > debug.fail_point.random_fortuna_pre_read: off > security.stack_protect.permit_nonrandom_cookies: 1 > > -- > WBR, Andrey V. Elsukov > [-- Attachment #2 --] 0 *H 010 `He 0 *H 00PN=d0 *H 0q10 UDE10U Deutsche Telekom AG10UT-TeleSec Trust Center1#0!UDeutsche Telekom Root CA 20 140722120826Z 190709235900Z0Z10 UDE10U DFN-Verein10UDFN-PKI1$0"UDFN-Verein PCA Global - G010"0 *H 0 g TÖP5=bnL ["t 41R(#t^[xx(59{-E z|J Æ\+1{$C8jh Oxv&t kν0Ob'0 e`M #*5X'vq5}o3]AkLQٽVVC='0IT4qul!'>99Hjə 00U0UI=D{) p>d0U#01ySz-l +30U00bU [0Y0+!,0+!, 0+!,0 +!,0 +!,0>U705031/-http://pki0336.telesec.de/rl/DT_ROOT_CA_2.crl0x+l0j0,+0 http://ocsp0336.telesec.de/ocspr0:+0.http://pki0336.telesec.de/crt/DT_ROOT_CA_2.cer0 *H c (!r9FY92% }Am n,Yu3a'ò5*Iff/]n?nZ[Cc\1_MeN2|zKM\t!uR>jӐ#nIg5MV/Ϸr>ɼ@Z=ּ÷2,jm59DXc$ Nn/8WI?nPo,FeϮٟS>/Ƅ}{$$c4Z *y:%Be;|#),9[T00$ H30 *H 0Z10 UDE10U DFN-Verein10UDFN-PKI1$0"UDFN-Verein PCA Global - G010 140527145409Z 190709235900Z010 UDE10UNordrhein-Westfalen10UMuenster1 0U Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0 *H ca@fh-muenster.de0"0 *H 0 yll""AODSW{gp5ȕ[۵K{{ N'%M|( 45 ~.;.e.xH&=k| fWv293qP_vd:;IyCl|쒷4/sCYձPG_EcjˠXh WZ xy_STbZOἥ^_Ml3d stЎEPKp7aa%w مgo 00U00U0U 00U 0U [15B70U#0I=D{) p>d0U0ca@fh-muenster.de0U0~0=;97http://cdp1.pca.dfn.de/global-root-ca/pub/crl/cacrl.crl0=;97http://cdp2.pca.dfn.de/global-root-ca/pub/crl/cacrl.crl0+003+0'http://ocsp.pca.dfn.de/OCSP-Server/OCSP0G+0;http://cdp1.pca.dfn.de/global-root-ca/pub/cacert/cacert.crt0G+0;http://cdp2.pca.dfn.de/global-root-ca/pub/cacert/cacert.crt0 *H G5Jo5-km˅qtMh(gsQb@2^Cl}h^tB f!*$(Y1Kdlh`V_+ tpz-ӎ~0kY!@Fw7+`vezZ%H&@E Ɏ, lfQ@k}u#>wڹf5Zl$K@eukYqFI;6]7.܋@ZyaƄ}~~0 0t70 *H 010 UDE10UNordrhein-Westfalen10UMuenster1 0U Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0 *H ca@fh-muenster.de0 160704070613Z 190704070613Z0|10 UDE1 0U Fachhochschule Muenster1200U)Fachbereich Elektrotechnik und Informatik10UMichael Tuexen0"0 *H 0 ̚Pmٛn6 lW<ƣ ~Kyw'L797V8yWY3H?.M:u.ۈdU=w>@.vWb_uK?XXxS6.N SY|n1kX_+\2L-=p ,&e;:ה⒬b G-_WԵDg bS" w`CD k [}m\! G0C0@U 9070+!,0+!,0 +!,0 U0 0U0U%0++0Ujf fEu0U#0 [15B70 U0tuexen@fh-muenster.de0U0~0=;97http://cdp1.pca.dfn.de/fh-muenster-ca/pub/crl/cacrl.crl0=;97http://cdp2.pca.dfn.de/fh-muenster-ca/pub/crl/cacrl.crl0+003+0'http://ocsp.pca.dfn.de/OCSP-Server/OCSP0G+0;http://cdp1.pca.dfn.de/fh-muenster-ca/pub/cacert/cacert.crt0G+0;http://cdp2.pca.dfn.de/fh-muenster-ca/pub/cacert/cacert.crt0 *H Hx:Tiʆ,$c`)nqF?ŖNqeu7B>-,!ŃRK~SyFrIʲ}iI81|W'·~'m >bZ5he ߲QN*t4vKsnsQqϨIG^VTU/<[U9J.B1i67(ɐvH )19050010 UDE10UNordrhein-Westfalen10UMuenster1 0U Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0 *H ca@fh-muenster.det70 `He 70 *H 1 *H 0 *H 1 190508162115Z0/ *H 1" ӳ!eMP9G[k`ک6J0 +710010 UDE10UNordrhein-Westfalen10UMuenster1 0U Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0 *H ca@fh-muenster.det70*H 1ՠ010 UDE10UNordrhein-Westfalen10UMuenster1 0U Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0 *H ca@fh-muenster.det70 *H R$VUOK "/._lX k!\b~}L!1y%\/h X7BxA!xrddm<Ao_،8/ҚL̀뛤 О Ӎ(N?N?ؼ$vu&+e |-|u_k>D̤K' V^;u]W_FiqI)ȕI܆>,'ia(vR\ay{
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?DC29F07C-AF92-4E03-9C64-5C3FB69A5360>
