diff options
author | Theodore Ts'o <tytso@mit.edu> | 2014-07-17 05:27:30 -0400 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2014-08-05 16:41:50 -0400 |
commit | 48d6be955a7167b0d0e025ae6c39e795e3544499 (patch) | |
tree | c6e3ebc786fbb45072fbda6a8c55e91aa17aaf95 | |
parent | c6e9d6f38894798696f23c8084ca7edbf16ee895 (diff) |
random: limit the contribution of the hw rng to at most half
For people who don't trust a hardware RNG which can not be audited,
the changes to add support for RDSEED can be troubling since 97% or
more of the entropy will be contributed from the in-CPU hardware RNG.
We now have a in-kernel khwrngd, so for those people who do want to
implicitly trust the CPU-based system, we could create an arch-rng
hw_random driver, and allow khwrng refill the entropy pool. This
allows system administrator whether or not they trust the CPU (I
assume the NSA will trust RDRAND/RDSEED implicitly :-), and if so,
what level of entropy derating they want to use.
The reason why this is a really good idea is that if different people
use different levels of entropy derating, it will make it much more
difficult to design a backdoor'ed hwrng that can be generally
exploited in terms of the output of /dev/random when different attack
targets are using differing levels of entropy derating.
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
-rw-r--r-- | drivers/char/random.c | 43 |
1 files changed, 4 insertions, 39 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c index 7d1682ea1e86..6e455bc4a39e 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c | |||
@@ -910,12 +910,13 @@ void add_interrupt_randomness(int irq, int irq_flags) | |||
910 | 910 | ||
911 | /* | 911 | /* |
912 | * If we have architectural seed generator, produce a seed and | 912 | * If we have architectural seed generator, produce a seed and |
913 | * add it to the pool. For the sake of paranoia count it as | 913 | * add it to the pool. For the sake of paranoia don't let the |
914 | * 50% entropic. | 914 | * architectural seed generator dominate the input from the |
915 | * interrupt noise. | ||
915 | */ | 916 | */ |
916 | if (arch_get_random_seed_long(&seed)) { | 917 | if (arch_get_random_seed_long(&seed)) { |
917 | __mix_pool_bytes(r, &seed, sizeof(seed)); | 918 | __mix_pool_bytes(r, &seed, sizeof(seed)); |
918 | credit += sizeof(seed) * 4; | 919 | credit = 1; |
919 | } | 920 | } |
920 | spin_unlock(&r->lock); | 921 | spin_unlock(&r->lock); |
921 | 922 | ||
@@ -1328,37 +1329,6 @@ void rand_initialize_disk(struct gendisk *disk) | |||
1328 | } | 1329 | } |
1329 | #endif | 1330 | #endif |
1330 | 1331 | ||
1331 | /* | ||
1332 | * Attempt an emergency refill using arch_get_random_seed_long(). | ||
1333 | * | ||
1334 | * As with add_interrupt_randomness() be paranoid and only | ||
1335 | * credit the output as 50% entropic. | ||
1336 | */ | ||
1337 | static int arch_random_refill(void) | ||
1338 | { | ||
1339 | const unsigned int nlongs = 64; /* Arbitrary number */ | ||
1340 | unsigned int n = 0; | ||
1341 | unsigned int i; | ||
1342 | unsigned long buf[nlongs]; | ||
1343 | |||
1344 | if (!arch_has_random_seed()) | ||
1345 | return 0; | ||
1346 | |||
1347 | for (i = 0; i < nlongs; i++) { | ||
1348 | if (arch_get_random_seed_long(&buf[n])) | ||
1349 | n++; | ||
1350 | } | ||
1351 | |||
1352 | if (n) { | ||
1353 | unsigned int rand_bytes = n * sizeof(unsigned long); | ||
1354 | |||
1355 | mix_pool_bytes(&input_pool, buf, rand_bytes); | ||
1356 | credit_entropy_bits(&input_pool, rand_bytes*4); | ||
1357 | } | ||
1358 | |||
1359 | return n; | ||
1360 | } | ||
1361 | |||
1362 | static ssize_t | 1332 | static ssize_t |
1363 | _random_read(int nonblock, char __user *buf, size_t nbytes) | 1333 | _random_read(int nonblock, char __user *buf, size_t nbytes) |
1364 | { | 1334 | { |
@@ -1379,11 +1349,6 @@ _random_read(int nonblock, char __user *buf, size_t nbytes) | |||
1379 | return n; | 1349 | return n; |
1380 | 1350 | ||
1381 | /* Pool is (near) empty. Maybe wait and retry. */ | 1351 | /* Pool is (near) empty. Maybe wait and retry. */ |
1382 | |||
1383 | /* First try an emergency refill */ | ||
1384 | if (arch_random_refill()) | ||
1385 | continue; | ||
1386 | |||
1387 | if (nonblock) | 1352 | if (nonblock) |
1388 | return -EAGAIN; | 1353 | return -EAGAIN; |
1389 | 1354 | ||