aboutsummaryrefslogtreecommitdiffstats
path: root/lib
diff options
context:
space:
mode:
authorHannes Frederic Sowa <hannes@stressinduktion.org>2013-11-11 06:20:33 -0500
committerDavid S. Miller <davem@davemloft.net>2013-11-11 14:32:14 -0500
commit6d31920246a9fc80be4f16acd27c0bbe8d7b8494 (patch)
tree59cf494b43a77fd528c77364c2376e65975a128a /lib
parent51c37a70aaa3f95773af560e6db3073520513912 (diff)
random32: add periodic reseeding
The current Tausworthe PRNG is never reseeded with truly random data after the first attempt in late_initcall. As this PRNG is used for some critical random data as e.g. UDP port randomization we should try better and reseed the PRNG once in a while with truly random data from get_random_bytes(). When we reseed with prandom_seed we now make also sure to throw the first output away. This suffices the reseeding procedure. The delay calculation is based on a proposal from Eric Dumazet. Joint work with Daniel Borkmann. Cc: Eric Dumazet <eric.dumazet@gmail.com> Cc: Theodore Ts'o <tytso@mit.edu> Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: Daniel Borkmann <dborkman@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'lib')
-rw-r--r--lib/random32.c23
1 files changed, 23 insertions, 0 deletions
diff --git a/lib/random32.c b/lib/random32.c
index 01e8890d1089..12215df701e8 100644
--- a/lib/random32.c
+++ b/lib/random32.c
@@ -142,6 +142,7 @@ void prandom_seed(u32 entropy)
142 for_each_possible_cpu (i) { 142 for_each_possible_cpu (i) {
143 struct rnd_state *state = &per_cpu(net_rand_state, i); 143 struct rnd_state *state = &per_cpu(net_rand_state, i);
144 state->s1 = __seed(state->s1 ^ entropy, 2); 144 state->s1 = __seed(state->s1 ^ entropy, 2);
145 prandom_u32_state(state);
145 } 146 }
146} 147}
147EXPORT_SYMBOL(prandom_seed); 148EXPORT_SYMBOL(prandom_seed);
@@ -174,6 +175,27 @@ static int __init prandom_init(void)
174} 175}
175core_initcall(prandom_init); 176core_initcall(prandom_init);
176 177
178static void __prandom_timer(unsigned long dontcare);
179static DEFINE_TIMER(seed_timer, __prandom_timer, 0, 0);
180
181static void __prandom_timer(unsigned long dontcare)
182{
183 u32 entropy;
184
185 get_random_bytes(&entropy, sizeof(entropy));
186 prandom_seed(entropy);
187 /* reseed every ~60 seconds, in [40 .. 80) interval with slack */
188 seed_timer.expires = jiffies + (40 * HZ + (prandom_u32() % (40 * HZ)));
189 add_timer(&seed_timer);
190}
191
192static void prandom_start_seed_timer(void)
193{
194 set_timer_slack(&seed_timer, HZ);
195 seed_timer.expires = jiffies + 40 * HZ;
196 add_timer(&seed_timer);
197}
198
177/* 199/*
178 * Generate better values after random number generator 200 * Generate better values after random number generator
179 * is fully initialized. 201 * is fully initialized.
@@ -194,6 +216,7 @@ static int __init prandom_reseed(void)
194 /* mix it in */ 216 /* mix it in */
195 prandom_u32_state(state); 217 prandom_u32_state(state);
196 } 218 }
219 prandom_start_seed_timer();
197 return 0; 220 return 0;
198} 221}
199late_initcall(prandom_reseed); 222late_initcall(prandom_reseed);