2014-04-14 15:26:48 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
2012-11-22 07:07:25 +00:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2012-11-22 07:07:25 +00:00
|
|
|
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
security.rngd.enable = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.bool;
|
2012-11-26 13:45:23 +00:00
|
|
|
default = true;
|
2012-11-22 07:07:25 +00:00
|
|
|
description = ''
|
2012-11-22 09:41:54 +00:00
|
|
|
Whether to enable the rng daemon, which adds entropy from
|
2012-11-22 07:07:25 +00:00
|
|
|
hardware sources of randomness to the kernel entropy pool when
|
2012-11-22 15:14:41 +00:00
|
|
|
available.
|
2012-11-22 07:07:25 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf config.security.rngd.enable {
|
2012-11-26 13:45:23 +00:00
|
|
|
services.udev.extraRules = ''
|
|
|
|
KERNEL=="random", TAG+="systemd"
|
|
|
|
SUBSYSTEM=="cpu", ENV{MODALIAS}=="x86cpu:*feature:*009E*", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"
|
|
|
|
KERNEL=="hw_random", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"
|
2015-01-06 14:23:36 +00:00
|
|
|
${if config.services.tcsd.enable then "" else ''KERNEL=="tpm0", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"''}
|
2012-11-26 13:45:23 +00:00
|
|
|
'';
|
|
|
|
|
2013-01-16 11:33:18 +00:00
|
|
|
systemd.services.rngd = {
|
2012-11-26 13:45:23 +00:00
|
|
|
bindsTo = [ "dev-random.device" ];
|
|
|
|
|
|
|
|
after = [ "dev-random.device" ];
|
2012-11-22 07:07:25 +00:00
|
|
|
|
|
|
|
description = "Hardware RNG Entropy Gatherer Daemon";
|
|
|
|
|
2014-04-22 12:41:22 +01:00
|
|
|
serviceConfig.ExecStart = "${pkgs.rng_tools}/sbin/rngd -f -v" +
|
|
|
|
(if config.services.tcsd.enable then " --no-tpm=1" else "");
|
2012-11-22 07:07:25 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|