Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-5718

Ensure /dev/random and /dev/urandom even if run in a container

Linking RHIVOS CVEs to...Migration: Automation ...SWIFT: POC ConversionSync from "Extern...XMLWordPrintable

    • None
    • rhel-bootloader
    • ssg_core_services
    • 8
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • If docs needed, set a value
    • None
    • 57,005

      Particularly with FIPS mode, it's required to have /dev/random and /dev/urandom in the initramfs. Today we usually run dracut in a fully privileged environment (e.g. a host system as root, or a build system for Image Builder/rpm-ostree).

      However, with https://fedoraproject.org/wiki/Changes/OstreeNativeContainer we want to enable a use case that looks like

      ```
      $ cat Dockerfile
      FROM quay.io/fedora/fedora-coreos:stable
      ADD /path/to/foo /usr/lib/dracut/modules.d
      RUN dracut
      ```

      to inject a dracut module and regenerate the initramfs.

      The default podman/docker policy denies creation of device nodes. However, we don't actually need to create "real" devices - we just need them to end up in the initramfs file.

      https://github.com/dracutdevs/dracut/pull/2331 is an upstream PR that aims to address this. Can you take a look?

      Basically we need to ensure that we always have the device nodes in the initramfs, regardless of FIPS mode or not.

              pvalena@redhat.com Pavel Valena
              walters@redhat.com Colin Walters
              Colin Walters
              Pavel Valena Pavel Valena
              RHEL CS Plumbers QE Bot RHEL CS Plumbers QE Bot
              Votes:
              0 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated:
                Resolved: