2014-04-14 18:26:48 +04:00
|
|
|
{ config, lib, pkgs, ... }:
|
2012-11-22 11:07:25 +04:00
|
|
|
|
2014-04-14 18:26:48 +04:00
|
|
|
with lib;
|
2012-11-22 11:07:25 +04:00
|
|
|
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
security.rngd.enable = mkOption {
|
2013-10-30 20:37:45 +04:00
|
|
|
type = types.bool;
|
2012-11-26 17:45:23 +04:00
|
|
|
default = true;
|
2012-11-22 11:07:25 +04:00
|
|
|
description = ''
|
2012-11-22 13:41:54 +04:00
|
|
|
Whether to enable the rng daemon, which adds entropy from
|
2012-11-22 11:07:25 +04:00
|
|
|
hardware sources of randomness to the kernel entropy pool when
|
2012-11-22 19:14:41 +04:00
|
|
|
available.
|
2012-11-22 11:07:25 +04:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf config.security.rngd.enable {
|
2012-11-26 17:45:23 +04:00
|
|
|
services.udev.extraRules = ''
|
|
|
|
KERNEL=="random", TAG+="systemd"
|
|
|
|
SUBSYSTEM=="cpu", ENV{MODALIAS}=="x86cpu:*feature:*009E*", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"
|
|
|
|
KERNEL=="hw_random", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"
|
2015-01-06 17:23:36 +03:00
|
|
|
${if config.services.tcsd.enable then "" else ''KERNEL=="tpm0", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"''}
|
2012-11-26 17:45:23 +04:00
|
|
|
'';
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
systemd.services.rngd = {
|
2012-11-26 17:45:23 +04:00
|
|
|
bindsTo = [ "dev-random.device" ];
|
|
|
|
|
|
|
|
after = [ "dev-random.device" ];
|
2012-11-22 11:07:25 +04:00
|
|
|
|
|
|
|
description = "Hardware RNG Entropy Gatherer Daemon";
|
|
|
|
|
2014-04-22 15:41:22 +04:00
|
|
|
serviceConfig.ExecStart = "${pkgs.rng_tools}/sbin/rngd -f -v" +
|
|
|
|
(if config.services.tcsd.enable then " --no-tpm=1" else "");
|
2012-11-22 11:07:25 +04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|