Provided by: jitterentropy-rngd_1.2.8-1_amd64 bug

NAME

       jitterentropy-rngd - CPU Jitter Random Number Generator Daemon

SYNOPSIS

       jitterentropy-rngd [OPTION]

DESCRIPTION

       The  jitterentropy-rngd  application  provides  a source of good entropy by collecting CPU
       execution time jitter. The collected entropy is injected into the Linux kernel /dev/random
       device using the RNDADDENTROPY ioctl described in random(4).

       The  entropy in the CPU execution time jitter is magnified by the CPU Jitter Random Number
       Generator. The CPU Jitter Random Number Generator uses the CPU execution timing jitter  to
       generate  a  bit  stream  which  complies  with  different  statistical  measurements that
       determine the bit stream is random.

       The CPU Jitter Random Number Generator works equally well in virtualized  environments  as
       well  as  on  bare-metal  provided  a  high-resolution  timer  is  made available with the
       clock_gettime() function. The currently used timer can be  checked  by  reading  the  file
       /sys/devices/system/clocksource/clocksource0/current_clocksource.   If  the  clock  source
       shall  be  changed,  one  of  the   available   clock   sources   listed   in   the   file
       /sys/devices/system/clocksource/clocksource0/available_clocksource can be written into the
       mentioned current_clocksource file and the kernel immediately changes the use clock.

       The CPU Jitter Random Number Generator unconditionally injects 256 bits  of  entropy  into
       the  Linux  kernel  during startup time before it daemonizes. Thus, when the invocation of
       the jitterentropy-rngd returns, the Linux kernel is seeded  with  at  least  256  bits  of
       entropy.  The  reader  should consider that the Linux kernel performs a schedule operation
       during  the  injection  of  data  which  implies  that  immediately  after  starting   the
       jitterentropy-rngd  the kernel may still complain about insufficient entropy available for
       /dev/urandom.

       In addition,  the  jitterentropy-rngd  injects  256  bits  of  entropy  every  10  minutes
       unconditionally irrespective whether the kernel has sufficient entropy or not.

       The following options are supported when invoking jitterentropy-rngd:

       -v, --verbose
              enable  a  verbose  operation  of  the  daemon.  Using  this  option multiple times
              increases the verbosity. Using this option implies that the jitterentropy-rngd will
              not daemonize.

       -p, --pid [FILE]
              triggers the creation of a PID file at the given location.

       -h, --help
              displays the help text

       --version
              returns the version number of the jitterentropy-rngd.

       -s, --sp800-90b
              triggers  a  specific  seeding  strategy of the kernel /dev/random device to insert
              entropy that ensures the ChaCha20 DRNG behind  /dev/random  receives  256  bits  of
              entropy as defined by SP800-90B.

       -f, --flags [FLAGS]
              allows  specifying the flags value documented with jitterentropy(3) when allocating
              the Jitter RNG.

       -o, --osr [OSR]
              allows specifying the oversampling rate (OSR) as documented  with  jitterentropy(3)
              when allocating the Jitter RNG.

NOTES

       The jitterentropy-rngd does not perform write operations on any file system object.  Thus,
       it can be executed on a fully read-only mounted file system.

       The  random  bit  stream  generated  by  jitterentropy-rngd  is   NOT   processed   by   a
       cryptographically  secure  whitening function. Nonetheless, it is believed that the output
       can  be  used  as  a  source  for  cryptographically  secure   key   material   or   other
       cryptographically sensitive data.

SEE ALSO

       random(4) clock_gettime(2)

                                            2017-02-11                      JITTERENTROPY-RNGD(1)