From: daw@cs.berkeley.edu (David Wagner)
To: linux-kernel@vger.kernel.org
Subject: Re: [andrea@cpushare.com: Re: disable tsc with seccomp]
Date: Thu, 15 Dec 2005 05:59:19 +0000 (UTC) [thread overview]
Message-ID: <dnr0nn$969$1@taverner.CS.Berkeley.EDU> (raw)
In-Reply-To: 20051213053836.GY3092@opteron.random
Andrea Arcangeli wrote:
>I take the opportunity of this reminder email, to ask one more question
>about the /dev/urandom device. It would be really nice to have a good
>random number generator in CPUShare-seccomp mode, so I'm considering
>changing the CPUShare sell client to open /dev/urandom in O_RDONLY mode
>before firing seccomp. However such a change means the urandom device
>driver will have to be secure in the way it creates the buffer [...]
What you suggest seems reasonable. I guess I'm not qualified to take
any position on the specific question you asked. However, I thought I'd
add a third option, that you could consider (though please don't consider
this as a criticism of any of your proposals).
The third option: When the seccomp-restricted program is spawned, the
parent could read 16 bytes from /dev/urandom, then communicate that
16-byte value to the seccomp-restricted child. The child could then use
that as a seed to its own cryptographic pseudorandom generator, and could
generate all the pseudorandom values it needs starting from that seed,
without needing to interact with the OS or with /dev/urandom at all.
Expanding a short 16-byte seed into a long stretch of cryptographically
pseudorandom data only requires computation, so you can already support
this in today's seccomp, if I understand correctly how seccomp works.
Note that this option does not require SSL, and does not require
communicating the random bits across the Internet (which seems like a
questionable practice), so this is much safer than having someone on
the other side of the Internet pick your random numbers for you.
prev parent reply other threads:[~2005-12-15 5:59 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-12-13 5:38 [andrea@cpushare.com: Re: disable tsc with seccomp] Andrea Arcangeli
2005-12-15 5:59 ` David Wagner [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='dnr0nn$969$1@taverner.CS.Berkeley.EDU' \
--to=daw@cs.berkeley.edu \
--cc=daw-usenet@taverner.CS.Berkeley.EDU \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox