2012-06-25 18:13:17 +08:00
|
|
|
<?xml version="1.0"?>
|
|
|
|
<!--*-nxml-*-->
|
2019-03-14 21:40:58 +08:00
|
|
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
|
|
|
|
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
2020-11-09 12:23:58 +08:00
|
|
|
<!-- SPDX-License-Identifier: LGPL-2.1-or-later -->
|
2013-05-16 04:38:51 +08:00
|
|
|
<refentry id="systemd-random-seed.service" conditional='ENABLE_RANDOMSEED'>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<refentryinfo>
|
|
|
|
<title>systemd-random-seed.service</title>
|
|
|
|
<productname>systemd</productname>
|
|
|
|
</refentryinfo>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<refmeta>
|
|
|
|
<refentrytitle>systemd-random-seed.service</refentrytitle>
|
|
|
|
<manvolnum>8</manvolnum>
|
|
|
|
</refmeta>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<refnamediv>
|
|
|
|
<refname>systemd-random-seed.service</refname>
|
|
|
|
<refname>systemd-random-seed</refname>
|
|
|
|
<refpurpose>Load and save the system random seed at boot and shutdown</refpurpose>
|
|
|
|
</refnamediv>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<refsynopsisdiv>
|
|
|
|
<para><filename>systemd-random-seed.service</filename></para>
|
2017-08-31 17:31:08 +08:00
|
|
|
<para><filename>/usr/lib/systemd/random-seed</filename></para>
|
2015-02-04 10:14:13 +08:00
|
|
|
</refsynopsisdiv>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<refsect1>
|
|
|
|
<title>Description</title>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2019-07-22 20:19:33 +08:00
|
|
|
<para><filename>systemd-random-seed.service</filename> is a service that loads an on-disk random seed
|
|
|
|
into the kernel entropy pool during boot and saves it at shutdown. See
|
|
|
|
<citerefentry><refentrytitle>random</refentrytitle><manvolnum>4</manvolnum></citerefentry> for
|
|
|
|
details. By default, no entropy is credited when the random seed is written into the kernel entropy pool,
|
|
|
|
but this may be changed with <varname>$SYSTEMD_RANDOM_SEED_CREDIT</varname>, see below. On disk the random
|
|
|
|
seed is stored in <filename>/var/lib/systemd/random-seed</filename>.</para>
|
|
|
|
|
|
|
|
<para>Note that this service runs relatively late during the early boot phase, i.e. generally after the
|
|
|
|
initial RAM disk (initrd) completed its work, and the <filename>/var/</filename> file system has been
|
|
|
|
mounted writable. Many system services require entropy much earlier than this — this service is hence of
|
|
|
|
limited use for complex system. It is recommended to use a boot loader that can pass an initial random
|
|
|
|
seed to the kernel to ensure that entropy is available from earliest boot on, for example
|
|
|
|
<citerefentry><refentrytitle>systemd-boot</refentrytitle><manvolnum>7</manvolnum></citerefentry>, with
|
|
|
|
its <command>bootctl random-seed</command> functionality.</para>
|
|
|
|
|
2020-07-06 16:49:59 +08:00
|
|
|
<para>When loading the random seed from disk, the file is immediately updated with a new seed retrieved
|
2019-07-22 20:19:33 +08:00
|
|
|
from the kernel, in order to ensure no two boots operate with the same random seed. This new seed is
|
|
|
|
retrieved synchronously from the kernel, which means the service will not complete start-up until the
|
|
|
|
random pool is fully initialized. On entropy-starved systems this may take a while. This functionality is
|
|
|
|
intended to be used as synchronization point for ordering services that require an initialized entropy
|
|
|
|
pool to function securely (i.e. services that access <filename>/dev/urandom</filename> without any
|
|
|
|
further precautions).</para>
|
|
|
|
|
|
|
|
<para>Care should be taken when creating OS images that are replicated to multiple systems: if the random
|
|
|
|
seed file is included unmodified each system will initialize its entropy pool with the same data, and
|
|
|
|
thus — if otherwise entropy-starved — generate the same or at least guessable random seed streams. As a
|
|
|
|
safety precaution crediting entropy is thus disabled by default. It is recommended to remove the random
|
|
|
|
seed from OS images intended for replication on multiple systems, in which case it is safe to enable
|
2022-03-23 19:04:28 +08:00
|
|
|
entropy crediting, see below. Also see <ulink url="https://systemd.io/BUILDING_IMAGES">Safely Building
|
|
|
|
Images</ulink>.</para>
|
2019-07-23 00:13:26 +08:00
|
|
|
|
|
|
|
<para>See <ulink url="https://systemd.io/RANDOM_SEEDS">Random Seeds</ulink> for further
|
|
|
|
information.</para>
|
2019-07-22 20:19:33 +08:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Environment</title>
|
|
|
|
|
|
|
|
<variablelist class='environment-variables'>
|
|
|
|
<varlistentry>
|
|
|
|
<term><varname>$SYSTEMD_RANDOM_SEED_CREDIT</varname></term>
|
|
|
|
<listitem><para>By default, <filename>systemd-random-seed.service</filename> does not credit any
|
|
|
|
entropy when loading the random seed. With this option this behaviour may be changed: it either takes
|
|
|
|
a boolean parameter or the special string <literal>force</literal>. Defaults to false, in which case
|
|
|
|
no entropy is credited. If true, entropy is credited if the random seed file and system state pass
|
|
|
|
various superficial concisistency checks. If set to <literal>force</literal> entropy is credited,
|
|
|
|
regardless of these checks, as long as the random seed file exists.</para></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
2015-02-04 10:14:13 +08:00
|
|
|
</refsect1>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<refsect1>
|
|
|
|
<title>See Also</title>
|
|
|
|
<para>
|
|
|
|
<citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
|
2019-07-22 20:19:33 +08:00
|
|
|
<citerefentry><refentrytitle>random</refentrytitle><manvolnum>4</manvolnum></citerefentry>,
|
|
|
|
<citerefentry><refentrytitle>systemd-boot</refentrytitle><manvolnum>7</manvolnum></citerefentry>,
|
|
|
|
<citerefentry><refentrytitle>bootctl</refentrytitle><manvolnum>4</manvolnum></citerefentry>
|
2015-02-04 10:14:13 +08:00
|
|
|
</para>
|
|
|
|
</refsect1>
|
2012-06-25 18:13:17 +08:00
|
|
|
|
|
|
|
</refentry>
|