kernel: enable RANDOM_TRUST_BOOTLOADER on >= 5.4
> Some bootloaders can provide entropy to increase the kernel's initial device randomness. This allows, for example, EFI to provide 64 bytes. In general my opinion is an attacker who can manipulate the random seed sufficiently to cause problems likely has other, more direct approaches at their disposal as well.
This commit is contained in:
parent
105c8d02d2
commit
a5c28278f9
@ -479,6 +479,7 @@ let
|
||||
DEFAULT_SECURITY_APPARMOR = yes;
|
||||
|
||||
RANDOM_TRUST_CPU = whenAtLeast "4.19" yes; # allow RDRAND to seed the RNG
|
||||
RANDOM_TRUST_BOOTLOADER = whenAtLeast "5.4" yes; # allow the bootloader to seed the RNG
|
||||
|
||||
MODULE_SIG = no; # r13y, generates a random key during build and bakes it in
|
||||
# Depends on MODULE_SIG and only really helps when you sign your modules
|
||||
|
Loading…
Reference in New Issue
Block a user