All of lore.kernel.org
 help / color / mirror / Atom feed
From: Stephan Mueller <smueller@chronox.de>
To: Shubham Bansal <illusionist.neo@gmail.com>
Cc: kernel-hardening@lists.openwall.com, sandyinchina@gmail.com,
	tytso@mit.edu, keescook@chromium.org, jsd@av8n.com
Subject: Re: [kernel-hardening] Looking for something to WORK ON
Date: Sun, 10 Jul 2016 21:29:08 +0200	[thread overview]
Message-ID: <3354538.ebClkig31Y@positron.chronox.de> (raw)
In-Reply-To: <CAHgaXdJSH3O6q5ZPRRyUwYhCH1M7xQOXGsiynDFNaRjTGebZHg@mail.gmail.com>

Am Sonntag, 10. Juli 2016, 22:12:53 CEST schrieb Shubham Bansal:

Hi Shubham,

> Hi Sandy,
> 
> On Wed, Jul 6, 2016 at 8:44 PM, Sandy Harris <sandyinchina@gmail.com> wrote:
> > Shubham Bansal <illusionist.neo@gmail.com> wrote:
> > > I want to start with linux kernel development and looking for some
> > 
> > project
> > 
> > > where I can contribute.
> > 
> > Nearly all crypto and the address randomisation that is part of kernel
> > hardening depend on good random numbers, for Linux on the random(4)
> > driver. Getting it initialised early enough & well enough is an
> > extremely tricky problem. Several people have proposed solutions but
> > AFAIK none are complete and it might benefit from having fresh eyes
> > take a look, especially if you have a good background in crypto or
> > math.
> 
> I have a basic understanding of crypto as I just graduated. But it sound
> really interesting to work on. I am happy to work on it if you think it
> would be good, But I must tell you that I have to read a lot for this.
> 
> > Not all discussion is here; other relevant lists include
> > linux-crypto@vger.kernel.org and cryptography@metzdowd.com.
> 
> Subscribed.
> 
> > People to
> > look for include the maintainer, tytso@mit.edu, the main person
> > working on the problem here, keescook@chromium.org,
> 
> Should I mail them to get the update and how can I start contributing ?
> 
> > two guys who have
> > proposed drive rewrites that partly solve the problem, me and
> > smueller@chronox.de, and one with a lot of excellent comments,
> > jsd@av8n.com.
> 
> Would it be possible to work with you on this ? I would try my best. I
> would need some help from your side though.
> 
> Looking forward to hearing back from you. I would like to get started with
> it soon.

My code is in the kernel at crypto/jitterentropy.c. It is completely 
standalone and does not require anything, provided the intended architecture 
has either random_get_entropy() or get_cycles implemented. I have tested it on 
bare metal without a kernel. Thus, it can be operational as early as you need 
it.

To make it fully standalone, you have to:

- compile jitterentropy.c and the helper functions listed at the top in 
jitterentropy.c and implemented in jitterentropy_kcapi.c (note, 
jent_fips_enabled is not needed for your purpose)

- statically allocate the memory obtained in jent_entropy_collector_alloc

- ensure serialization as necessary

I strongly suggest that you call jent_entropy_init to ensure that the timer 
has a sufficient high resolution before you collect entropy with 
jent_read_entropy.

Note, I am currently getting help from a big chip vendor tracking down the 
root cause that beyond the analysis of chapter 6.1 in my report.

Ciao
Stephan

  reply	other threads:[~2016-07-10 19:29 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-07-06 14:40 [kernel-hardening] Looking for something to WORK ON Shubham Bansal
2016-07-06 15:14 ` Sandy Harris
2016-07-10 16:42   ` Shubham Bansal
2016-07-10 19:29     ` Stephan Mueller [this message]
2016-07-06 17:35 ` Kees Cook
2016-07-10 16:04   ` Shubham Bansal
2016-07-11 18:52     ` Kees Cook
2016-07-12 13:25       ` Shubham Bansal
2016-07-12 17:17         ` Kees Cook
2016-07-12 17:36           ` Mark Rutland
2016-07-12 18:45             ` Kees Cook
2016-07-13  7:37           ` Shubham Bansal
2016-07-13  9:02             ` Daniel Borkmann
2017-01-11 12:46               ` Shubham Bansal
2017-01-11 21:29                 ` Kees Cook
2017-01-11 22:12                   ` Shubham Bansal
2017-01-11 22:39                     ` Daniel Borkmann
2017-01-12 16:19                       ` Shubham Bansal
2016-07-11 19:05     ` Valdis.Kletnieks
2016-07-11 19:14       ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3354538.ebClkig31Y@positron.chronox.de \
    --to=smueller@chronox.de \
    --cc=illusionist.neo@gmail.com \
    --cc=jsd@av8n.com \
    --cc=keescook@chromium.org \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=sandyinchina@gmail.com \
    --cc=tytso@mit.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.