From: Stephan Mueller <smueller@chronox.de>
To: Anton Ivanov <anton.ivanov@kot-begemot.co.uk>,
linux-um@lists.infradead.org,
Johannes Berg <johannes@sipsolutions.net>
Cc: linux-crypto@vger.kernel.org
Subject: Re: jitterentropy vs. simulation
Date: Mon, 04 Dec 2023 09:52:27 +0100 [thread overview]
Message-ID: <1947100.kdQGY1vKdC@tauon.chronox.de> (raw)
In-Reply-To: <8ddb48606cebe4e404d17a627138aa5c5af6dccd.camel@sipsolutions.net>
Am Freitag, 1. Dezember 2023, 19:35:11 CET schrieb Johannes Berg:
Hi Johannes,
> [I guess we should keep the CCs so other see it]
>
> > Looking at the stuck check it will be bogus in simulations.
>
> True.
>
> > You might as well ifdef that instead.
> >
> > If a simulation is running insert the entropy regardless and do not
> > compute the derivatives used in the check.
> Actually you mostly don't want anything inserted in that case, so it's
> not bad to skip it.
>
> I was mostly thinking this might be better than adding a completely
> unrelated ifdef. Also I guess in real systems with a bad implementation
> of random_get_entropy(), the second/third derivates might be
> constant/zero for quite a while, so may be better to abort?
>
> In any case, I couldn't figure out any way to not configure this into
> the kernel when any kind of crypto is also in ...
The reason for the Jitter RNG to be dragged in is the Kconfig select in
CRYPTO_DRBG. Why does the DRBG require it?
The DRBG seeds from get_random_bytes || jitter rng output. It pulls an equal
amount of data from each source where each source alone is able to provide all
entropy that the DRBG needs. That said, the Jitter RNG can be designated as
optional, because the code already can handle the situation where this Jitter
RNG is not available. However, in FIPS mode, we must have the Jitter RNG
source.
That said, I could fathom to change CRYPTO_DRBG to remove the select
CRYPTO_JITTERENTROPY. But instead, add the select to CRYPTO_FIPS.
This change would entail a new log entry when a DRBG instance initializes:
pr_info("DRBG: Continuing without Jitter RNG\n");
I would assume that this change could help you to deselect the Jitter RNG in
your environment.
Side note: do you have an idea how that Jitter RNG perhaps could still be
selected by default when the DRBG is enabled, but allows it being deselected
following the aforementioned suggestion?
Ciao
Stephan
next prev parent reply other threads:[~2023-12-04 8:52 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-12-01 10:21 jitterentropy vs. simulation Johannes Berg
2023-12-01 18:03 ` Anton Ivanov
2023-12-01 18:35 ` Johannes Berg
2023-12-01 19:25 ` Simo Sorce
2023-12-01 20:04 ` Johannes Berg
2023-12-04 8:52 ` Stephan Mueller [this message]
2023-12-04 10:24 ` Johannes Berg
2023-12-04 10:35 ` Stephan Mueller
2023-12-04 12:06 ` Benjamin Beichler
2023-12-04 12:50 ` Anton Ivanov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1947100.kdQGY1vKdC@tauon.chronox.de \
--to=smueller@chronox.de \
--cc=anton.ivanov@kot-begemot.co.uk \
--cc=johannes@sipsolutions.net \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-um@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox