From: Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
To: Jim Foraker <foraker1-i2BcT+NCU+M@public.gmane.org>
Cc: Hal Rosenstock
<hal-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>,
linux-rdma <linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
Subject: Re: [PATCH fixed] libibmad: Add MKey support to SMP requests via smp_mkey_get/set()
Date: Tue, 13 Mar 2012 10:50:20 -0600 [thread overview]
Message-ID: <20120313165020.GE9585@obsidianresearch.com> (raw)
In-Reply-To: <1331341747.17729.253.camel-mxTxeWJot8FliZ7u+bvwcg@public.gmane.org>
On Fri, Mar 09, 2012 at 05:09:07PM -0800, Jim Foraker wrote:
> > I don't think using passwords for this sort of thing is really a good
> > idea. It has been shown again and again the extrapolating keys from
> > passwords does not stand up. Better to design around a large true
> > random key (eg how bind's rndc works) than a password. In that
> > instance truncated HMAC-SHA2-512 is entirely sufficient.
> Large random strings end up having to be stored on disk, which may
> be its own issue. An attacker need not bother with a preimage attack at
> all if the admin has copied a bulky keyfile to every host so as to make
> their lives tenable. "Well they shouldn't do that" may not be listened
> to any better than "don't use weak passwords" has been.
Sure, but the only other options that have been brought up:
a) A config file of keys - that has to be copied too
b) completely random keys (in a file) - that has to be copied
c) A password - is weak to offline attacks, and if an attaker can
compromise a secure file then they can probably compromise the
tool that accepts the password from the admin.
So, it really isn't much of a difference at all.
In truth, we probably don't want to distribute anything to the
hosts, but rely on some kind of authenticated transaction with the SA
to fetch the mkey data. Eg the admin could use his kerberos login
ticket to get the mkey of a node from the SA's database. (Of course, if
you could steal the key file, you can probably steal a kerberos ticket
as well..)
> exploitable weaknesses in the code. If we want to install a stronger
> front door, it would behoove us to make sure the windows aren't already
> the weakest link.
Unless someone gets a viable mkey model working none of the vendors
are really going to care if their implementations are any good..
> B is potentially equivalent to using a perfectly secure KDF of some
> sort. "Perfect security" being what it is though, there may be some
> folks who just don't want to risk any sort of preimage attack.
These folks should be using pkey to prevent SMA's from even being
contacted by an untrustable end port.
> A's security depends on how that config file is generated and
> distributed. Its key benefit is simplicity and configurability --
> the admin gets free reign to generate keys however they want,
> according to local needs and policy.
That would almost certainly be a distaster, very few sites would have
the skills to make this work, and IMHO, the gain over a secure
generator is very negligible.
> up to date with new guids as hardware comes and goes. In my mind,
> the most useful way forward is derived keys of some sort. However,
> I don't think it's necessarily a one-size-fits-all solution, and
> supporting a few differing schemes seems reasonable to me.
It is always prudent to have some way to upgrade algorithms when doing
crypto, but I really disagree that introducing complexity for
something as minor as mkey is a good choice. People are far more
likely to make a bad choice and get no meaningful security at all.
Jason
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
next prev parent reply other threads:[~2012-03-13 16:50 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-03-06 20:09 [PATCH] libibmad: Add MKey support to SMP requests via smp_mkey_get/set() Jim Foraker
[not found] ` <1331064594.10889.8.camel-mxTxeWJot8FliZ7u+bvwcg@public.gmane.org>
2012-03-06 22:12 ` [PATCH fixed] " Jim Foraker
[not found] ` <1331071949.17729.11.camel-mxTxeWJot8FliZ7u+bvwcg@public.gmane.org>
2012-03-09 12:59 ` Hal Rosenstock
[not found] ` <4F59FECE.4030107-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
2012-03-09 17:09 ` Hefty, Sean
[not found] ` <1828884A29C6694DAF28B7E6B8A823733B767E36-P5GAC/sN6hmkrb+BlOpmy7fspsVTdybXVpNB7YpNyf8@public.gmane.org>
2012-03-13 12:29 ` Hal Rosenstock
2012-03-09 18:04 ` Jason Gunthorpe
[not found] ` <20120309180459.GB29961-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2012-03-09 20:14 ` Ira Weiny
2012-03-09 20:32 ` Jim Foraker
[not found] ` <1331325175.17729.112.camel-mxTxeWJot8FliZ7u+bvwcg@public.gmane.org>
2012-03-09 21:01 ` Jason Gunthorpe
[not found] ` <20120309210151.GA32353-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2012-03-10 1:09 ` Jim Foraker
[not found] ` <1331341747.17729.253.camel-mxTxeWJot8FliZ7u+bvwcg@public.gmane.org>
2012-03-13 16:50 ` Jason Gunthorpe [this message]
[not found] ` <20120313165020.GE9585-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2012-03-16 0:27 ` Jim Foraker
[not found] ` <1331857632.17729.751.camel-mxTxeWJot8FliZ7u+bvwcg@public.gmane.org>
2012-03-16 6:19 ` Jason Gunthorpe
2012-03-13 12:31 ` Hal Rosenstock
[not found] ` <4F5F3E36.9010600-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
2012-03-13 16:35 ` Jason Gunthorpe
[not found] ` <20120313163505.GC9585-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2012-03-14 12:41 ` Hal Rosenstock
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20120313165020.GE9585@obsidianresearch.com \
--to=jgunthorpe-epgobjl8dl3ta4ec/59zmfatqe2ktcn/@public.gmane.org \
--cc=foraker1-i2BcT+NCU+M@public.gmane.org \
--cc=hal-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org \
--cc=linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox