Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 May 2019 18:21:14 +0200
From:      Michael Tuexen <tuexen@fh-muenster.de>
To:        "Andrey V. Elsukov" <bu7cher@yandex.ru>
Cc:        freebsd-current <freebsd-current@FreeBSD.org>
Subject:   Re: random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' returned no entropy.
Message-ID:  <DC29F07C-AF92-4E03-9C64-5C3FB69A5360@fh-muenster.de>
In-Reply-To: <2c1eceb4-08a5-b633-2ce2-c711610db1cb@yandex.ru>
References:  <2c1eceb4-08a5-b633-2ce2-c711610db1cb@yandex.ru>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
> On 8. May 2019, at 18:13, Andrey V. Elsukov <bu7cher@yandex.ru> wrote:
> 
> Hi,
> 
> today I updated one of my test machines and discovered that message from
> the subject periodically printed in the console.
Fixed in  https://svnweb.freebsd.org/changeset/base/347329

Best regards
Michael
> 
> FreeBSD 13.0-CURRENT r347327=4f47587(svn_head) GENERIC-NODEBUG amd64
> FreeBSD clang version 8.0.0 (tags/RELEASE_800/final 356365) (based on
> LLVM 8.0.0)
> VT(vga): resolution 640x480
> CPU: Intel(R) Xeon(R) CPU E5-2660 v4@ 2.00GHz (2000.04-MHz K8-class CPU)
> ...
> real memory  = 68719476736 (65536 MB)
> avail memory = 66722340864 (63631 MB)
> Event timer "LAPIC" quality 600
> ACPI APIC Table: <SUPERM SMCI--MB>
> FreeBSD/SMP: Multiprocessor System Detected: 28 CPUs
> FreeBSD/SMP: 2 package(s) x 14 core(s)
> ...
> 
> % grep -c random /var/run/dmesg.boot
> 606
> 
> % grep random /var/run/dmesg.boot | head -10
> __stack_chk_init: WARNING: Initializing stack protection with non-random
> cookies!
> random: entropy device external interface
> random: registering fast source Intel Secure Key RNG
> random: fast provider: "Intel Secure Key RNG"
> arc4random: WARNING: initial seeding bypassed the cryptographic random
> device because it was not yet seeded and the knob
> 'bypass_before_seeding' was enabled.
> random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG'
> returned no entropy.
> random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG'
> returned no entropy.
> random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG'
> returned no entropy.
> random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG'
> returned no entropy.
> random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG'
> returned no entropy.
> 
> % sysctl -a | grep -v random_sources_feed | grep rand
> kern.fallback_elf_brand: -1
> device	random
> device	rdrand_rng
> kern.randompid: 0
> kern.elf32.fallback_brand: -1
> kern.elf64.fallback_brand: -1
> kern.random.fortuna.minpoolsize: 64
> kern.random.harvest.mask_symbolic:
> PURE_RDRAND,[UMA],[FS_ATIME],SWI,INTERRUPT,NET_NG,[NET_ETHER],NET_TUN,MOUSE,KEYBOARD,ATTACH,CACHED
> kern.random.harvest.mask_bin: 000000010000000111011111
> kern.random.harvest.mask: 66015
> kern.random.use_chacha20_cipher: 0
> kern.random.block_seeded_status: 0
> kern.random.random_sources: 'Intel Secure Key RNG'
> kern.random.initial_seeding.disable_bypass_warnings: 0
> kern.random.initial_seeding.arc4random_bypassed_before_seeding: 1
> kern.random.initial_seeding.read_random_bypassed_before_seeding: 0
> kern.random.initial_seeding.bypass_before_seeding: 1
> net.inet.ip.portrange.randomtime: 45
> net.inet.ip.portrange.randomcps: 10
> net.inet.ip.portrange.randomized: 1
> net.inet.ip.random_id_total: 0
> net.inet.ip.random_id_collisions: 0
> net.inet.ip.random_id_period: 0
> net.inet.ip.random_id: 0
> net.key.int_random: 60
> debug.fail_point.status_fill_kinfo_vnode__random_path: off
> debug.fail_point.fill_kinfo_vnode__random_path: off
> debug.fail_point.status_random_fortuna_pre_read: off
> debug.fail_point.random_fortuna_pre_read: off
> security.stack_protect.permit_nonrandom_cookies: 1
> 
> -- 
> WBR, Andrey V. Elsukov
> 


[-- Attachment #2 --]
0	*H
010
	`He0	*H
00PN=d0
	*H
0q10	UDE10U
Deutsche Telekom AG10UT-TeleSec Trust Center1#0!UDeutsche Telekom Root CA 20
140722120826Z
190709235900Z0Z10	UDE10U

DFN-Verein10UDFN-PKI1$0"UDFN-Verein PCA Global - G010"0
	*H
0
g
TÖP5=bnL["t 41R(#t^[xx(59{-Ez|JÆ\+1{$C8jhOxv&t	kν0Ob'0
e`M	#*5X'vq5}o3Š]AkLQٽVVC='0IT4qul!'>99Hjə00U0UI=D{)
p>d0U#01ySz-l
+30U00bU [0Y0+!,0+!,0+!,0
+!,0
+!,0>U705031/-http://pki0336.telesec.de/rl/DT_ROOT_CA_2.crl0x+l0j0,+0 http://ocsp0336.telesec.de/ocspr0:+0.http://pki0336.telesec.de/crt/DT_ROOT_CA_2.cer0
	*H
c (!r9FY92%
}Am
n,Yu3a'ò5*Iff/]n?nZ[Cc\1_MeN2|zKM\t!uR>jӐ#nIg5MV/Ϸr>ɼ@Z=ּ÷2,jm59DXc$Nn/8WI?nPo,FeϮٟS>/Ƅ}{$$c4Z *y:%Be;|#),9[T00$	H30
	*H
0Z10	UDE10U

DFN-Verein10UDFN-PKI1$0"UDFN-Verein PCA Global - G010
140527145409Z
190709235900Z010	UDE10UNordrhein-Westfalen10UMuenster1 0U
Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0	*H
	ca@fh-muenster.de0"0
	*H
0
yll""AODSW{gp5ȕ[۵K{{ N'%M|(45
~.;.e.xH&=k|	fWv293qP_vd:;IyCl|쒷4/sCYձPG_EcjˠXh
WZ
xy_STbZOἥ^_Ml3dstЎEPKp7aa%w	مgo00U00U0U 
00U 0U
[15B70U#0I=D{)
p>d0U0ca@fh-muenster.de0U0~0=;97http://cdp1.pca.dfn.de/global-root-ca/pub/crl/cacrl.crl0=;97http://cdp2.pca.dfn.de/global-root-ca/pub/crl/cacrl.crl0+003+0'http://ocsp.pca.dfn.de/OCSP-Server/OCSP0G+0;http://cdp1.pca.dfn.de/global-root-ca/pub/cacert/cacert.crt0G+0;http://cdp2.pca.dfn.de/global-root-ca/pub/cacert/cacert.crt0
	*H
G5Jo5-km˅qtMh(gsQb@2^Cl}h^tB f!*$(Y1Kdlh`V_+
tpz-ӎ~0kY!@Fw7+`vezZ%H&@E
Ɏ,lfQ@k}u#>wڹf΃5Zl$K@eukYqFI;6]7.܋@ZyaƄ}~~0
0t70
	*H
010	UDE10UNordrhein-Westfalen10UMuenster1 0U
Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0	*H
	ca@fh-muenster.de0
160704070613Z
190704070613Z0|10	UDE1 0U
Fachhochschule Muenster1200U)Fachbereich Elektrotechnik und Informatik10UMichael Tuexen0"0
	*H
0
̚Pmٛn6
lW<ƣ ~Kyw'L797V8yWY3H?.M:u.ۈdU=w>@.vWb_uK?XXxS6.N
SY|n1kX_+\2L-=p
,&e;:ה⒬b
G-_WԵDg	bS"	w`CDk [}m\!G0C0@U 9070+!,0+!,0
+!,0	U00U0U%0++0UjffEu0U#0
[15B70 U0tuexen@fh-muenster.de0U0~0=;97http://cdp1.pca.dfn.de/fh-muenster-ca/pub/crl/cacrl.crl0=;97http://cdp2.pca.dfn.de/fh-muenster-ca/pub/crl/cacrl.crl0+003+0'http://ocsp.pca.dfn.de/OCSP-Server/OCSP0G+0;http://cdp1.pca.dfn.de/fh-muenster-ca/pub/cacert/cacert.crt0G+0;http://cdp2.pca.dfn.de/fh-muenster-ca/pub/cacert/cacert.crt0
	*H
Hx:Tiʆ,$c`)nqF?ŖNqeu7B>-,!ŃRK~SyFrIʲ}iI81|W'·~'m	>bZ5he ߲Q“N*΋׊t4vKsnsQqϨIG^VTU/<[U9J.B1i67(ɐvH
)19050010	UDE10UNordrhein-Westfalen10UMuenster1 0U
Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0	*H
	ca@fh-muenster.det70
	`He70	*H
	1	*H
0	*H
	1
190508162115Z0/	*H
	1" ӳ!eMP9G[k`ک6J0	+710010	UDE10UNordrhein-Westfalen10UMuenster1 0U
Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0	*H
	ca@fh-muenster.det70*H
	1ՠ010	UDE10UNordrhein-Westfalen10UMuenster1 0U
Fachhochschule Muenster1#0!UDatenverarbeitungszentrale10UFH Muenster CA - G011 0	*H
	ca@fh-muenster.det70
	*H
R$VUOK	"/._lX
k!\b~}L!1y%\/h
X7BxA!xrddm<Ao_،8/ҚL̀뛤
О Ӎ(N?N?ؼ$vu&+e
|-|u_k>D̤K'	V^;u]W_FiqI)ȕI܆>,'ia(vR\ay{

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?DC29F07C-AF92-4E03-9C64-5C3FB69A5360>