[systemd-devel] [PATCH] cryptsetup: Do not warn If the key is /dev/*random
Lennart Poettering
lennart at poettering.net
Mon Feb 2 07:42:21 PST 2015
On Mon, 02.02.15 12:06, Cristian RodrÃguez (crrodriguez at opensuse.org) wrote:
> Using /dev/urandom as a key is valid for swap, do not
> warn if this devices are world readable.
> ---
> src/cryptsetup/cryptsetup.c | 6 ++++--
> 1 file changed, 4 insertions(+), 2 deletions(-)
>
> diff --git a/src/cryptsetup/cryptsetup.c b/src/cryptsetup/cryptsetup.c
> index e6b37ac..38930ae 100644
> --- a/src/cryptsetup/cryptsetup.c
> +++ b/src/cryptsetup/cryptsetup.c
> @@ -624,8 +624,10 @@ int main(int argc, char *argv[]) {
>
> /* Ideally we'd do this on the open fd, but since this is just a
> * warning it's OK to do this in two steps. */
> - if (stat(key_file, &st) >= 0 && (st.st_mode & 0005))
> - log_warning("Key file %s is world-readable. This is not a good idea!", key_file);
> + if (stat(key_file, &st) >= 0 && (st.st_mode & 0005)) {
> + if(!STR_IN_SET(key_file, "/dev/urandom", "/dev/random", "/dev/hw_random"))
> + log_warning("Key file %s is world-readable. This is not a good idea!", key_file);
> + }
I'd prefer if we'd change the check instead to only apply to
S_ISREG() files. This way we wouldn't have to list all RNG device
nodes.
Lennart
--
Lennart Poettering, Red Hat
More information about the systemd-devel
mailing list