netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Theodore Tso <tytso@MIT.EDU>
To: Glen Turner <gdt@gdt.id.au>
Cc: Chris Peterson <cpeterso@cpeterso.com>,
	Alan Cox <alan@lxorguk.ukuu.org.uk>,
	Lennart Sorensen <lsorense@csclub.uwaterloo.ca>,
	Jeff Garzik <jeff@garzik.org>,
	"Kok, Auke" <auke-jan.h.kok@intel.com>,
	Rick Jones <rick.jones2@hp.com>,
	"Brandeburg, Jesse" <jesse.brandeburg@intel.com>,
	netdev@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] drivers/net: remove network drivers' last few uses of IRQF_SAMPLE_RANDOM
Date: Sun, 25 May 2008 19:27:12 -0400	[thread overview]
Message-ID: <20080525232712.GF5970@mit.edu> (raw)
In-Reply-To: <1211728189.5913.71.camel@andromache>

On Mon, May 26, 2008 at 12:39:49AM +0930, Glen Turner wrote:
> 
> For example, /dev/random has run out. So the output of /dev/urandom
> is now determined by previous values of /dev/random.  I then send in
> a stack of network packets at regular intervals. So the output of
> /dev/urandom is now greatly determined by those packets.  My search
> space for the resulting key is small since /dev/urandom appears to
> be random, but in fact is periodic.

That's not how it works.  Basically, as long as there is *some*
entropy in the system, even from the /var/lib/random-seed, or from
keyboard interrupts, or from mouse interrupts, which is unknown to the
attacker, in the worse case /dev/urandom will be no worse than a
cryptographic random number generator.

Even if you feed it huge amounts of known data, it won't allow you to
"influence" the cryptographic random number generator --- unless of
course SHA-1 is totally and thoroughly broken as a cryptographic hash
algorithm (invalidating all public key certificates and digital
signatures made using SHA-1 algorithm).

There is a reason why /dev/random is world-writeable; it's perfectly
safe to write arbitary amounts of data into /dev/random.  If the
attacker doesn't know what has been fixed into the entropy pool, his
life just got a lot harder.  If it is the attacker mixing known data
into the pool, it's no worse.

The problems with /dev/urandom only appear if there *all* of the data
is known by the attacker --- so all of the keyboard interrupts, all of
the network interrupts, all of the mouse interrupts, the initial
random seed file --- everything.  In practice the time when this has
come up is very early in the initial install process, where there is
no random seed file, and before any interrupt entropy has had a chance
to be mixed into the pool, particularly if it is a headless (i.e., no
keyboard, no mouse, no monitor) install process.

And here there is no magic bullet.  If you are doing a headless
install, and there is no entropy, and you don't have a way of
accessing a real hardware random number generator, THIS IS NOT THE
RIGHT TIME TO BE GENERATING SSH HOST KEYS.  

> I'll also note that there is a huge number of periodic packets seen by
> hosts on quiet networks -- such as a preparation VLAN where a system
> administrator might choose to run up a new machine.

If the attacker has the power to monitor your preparation/installation
network exactly when the machine is being installed, you probably have
worse problems on your hands --- for example, most distribution
installs off of CD include the RPM, and then get on the network to
grab the security updates.  If you have an attacker on your
preparation/install VLAN, they might be able to attack your machine
and install rootkit before you have a chance to install the security
errata RPM's.  That would be much simpler than trying to record all of
the network packet arrival times so you can try to guess the random
number generator!

		      	     	     	- Ted

  reply	other threads:[~2008-05-25 23:28 UTC|newest]

Thread overview: 93+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-05-15  7:11 [PATCH] drivers/net: remove network drivers' last few uses of IRQF_SAMPLE_RANDOM Chris Peterson
2008-05-15 13:21 ` Alan Cox
2008-05-15 16:07   ` Brandeburg, Jesse
2008-05-15 16:39     ` Alan Cox
2008-05-15 18:14       ` Jeff Garzik
2008-05-15 18:47         ` Kok, Auke
2008-05-15 19:10           ` Jeff Garzik
2008-05-15 18:50         ` Rick Jones
2008-05-15 19:11           ` Jeff Garzik
2008-05-15 19:55         ` [PATCH] " Jeff Garzik
2008-05-16  0:27           ` Andi Kleen
2008-05-16  9:56             ` Alan Cox
2008-05-16 10:19               ` Andi Kleen
2008-05-16 12:12                 ` Herbert Xu
2008-05-16 16:25                   ` Andi Kleen
2008-05-17  1:01                     ` Herbert Xu
2008-05-17 10:59                       ` Andi Kleen
2008-05-17 19:54                         ` Chris Peterson
2008-05-17 20:05                           ` Arjan van de Ven
2008-05-18 10:13                             ` Andi Kleen
2008-05-18 11:26                               ` Theodore Tso
2008-05-18 12:57                                 ` Joe Korty
2008-05-18 17:53                                 ` Andi Kleen
2008-05-25 15:26                                   ` Glen Turner
2008-05-19 12:29                                 ` Benny Amorsen
2008-05-18 10:08                           ` Andi Kleen
2008-05-22  9:28                     ` Helge Hafting
2008-05-16 13:20                 ` Adrian Bunk
2008-05-16 16:20                   ` Andi Kleen
2008-05-16 19:47               ` David Miller
2008-05-16 23:28         ` Rick Jones
2008-05-15 18:04     ` Jeff Garzik
2008-05-15 18:17       ` Rick Jones
2008-05-15 18:31         ` Jeff Garzik
2008-05-15 18:47           ` Kok, Auke
2008-05-15 19:21             ` Jeff Garzik
2008-05-15 20:01               ` Chris Peterson
2008-05-15 20:16                 ` Jeff Garzik
2008-05-15 20:39                   ` Kok, Auke
2008-05-15 21:47                 ` Theodore Tso
2008-05-15 21:58                   ` Jeff Garzik
2008-05-15 22:29                     ` Henrique de Moraes Holschuh
2008-05-15 22:44                       ` Jeff Garzik
2008-05-15 23:02                         ` Henrique de Moraes Holschuh
2008-05-15 23:36                           ` Theodore Tso
2008-05-15 23:46                             ` Henrique de Moraes Holschuh
2008-05-15 23:33                         ` Theodore Tso
2008-05-15 23:58                           ` Henrique de Moraes Holschuh
2008-05-16 13:21               ` Lennart Sorensen
2008-05-16 13:40                 ` Jeff Garzik
2008-05-16 13:59                   ` Will Newton
2008-05-16 14:15                     ` Lennart Sorensen
2008-05-16 14:27                     ` Jeff Garzik
2008-05-16 15:10                 ` Alan Cox
2008-05-16 17:36                   ` Lennart Sorensen
2008-05-16 18:11                     ` Alan Cox
2008-05-16 18:40                       ` Kok, Auke
2008-05-16 18:41                       ` Lennart Sorensen
2008-05-16 18:42                         ` Lennart Sorensen
2008-05-16 20:04                         ` Alan Cox
2008-05-16 20:39                           ` Lennart Sorensen
2008-05-16 20:46                             ` Alan Cox
2008-05-16 20:34                       ` Benny Amorsen
2008-05-25 15:02                         ` Glen Turner
2008-05-25 19:33                           ` Benny Amorsen
2008-05-17  4:55                       ` Chris Peterson
2008-05-25 15:09                         ` Glen Turner
2008-05-25 23:27                           ` Theodore Tso [this message]
2008-05-26 13:43                             ` Alejandro Riveira Fernández
2008-05-26 15:14                               ` Bill Fink
2008-05-26 21:07                                 ` Krzysztof Halasa
2008-05-26 21:52                                   ` Bill Fink
2008-05-26 22:11                                     ` Ben Hutchings
2008-05-27 16:44                                 ` Rick Jones
2008-05-30 19:50                                 ` Pavel Machek
2008-05-25 14:55             ` Glen Turner
     [not found]           ` <482C8550 <20080516161029.44ded734@core>
2008-05-16 20:08             ` Gilles Espinasse
2008-05-17 22:02               ` Adrian Bunk
2008-05-18  6:41                 ` [PATCH] drivers/net: remove network drivers' last few uses ofIRQF_SAMPLE_RANDOM Gilles Espinasse
2008-05-18  9:54                   ` Alan Cox
2008-05-18 12:02                   ` Adrian Bunk
2008-05-18 12:24                     ` Theodore Tso
2008-05-18 14:43                       ` Adrian Bunk
2008-05-15 21:55     ` [PATCH] drivers/net: remove network drivers' last few uses of IRQF_SAMPLE_RANDOM Adrian Bunk
2008-05-15 22:04       ` Jeff Garzik
2008-05-15 22:27         ` Theodore Tso
2008-05-15 22:13       ` Jesper Juhl
2008-05-15 22:34         ` Theodore Tso
2008-05-15 22:57           ` Jesper Juhl
2008-05-18  0:36       ` Matt Mackall
2008-05-15 22:42     ` Jeff Garzik
  -- strict thread matches above, loose matches on Subject: below --
2010-04-10  5:29 Chris Peterson
2010-04-15  6:42 ` David Miller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20080525232712.GF5970@mit.edu \
    --to=tytso@mit.edu \
    --cc=alan@lxorguk.ukuu.org.uk \
    --cc=auke-jan.h.kok@intel.com \
    --cc=cpeterso@cpeterso.com \
    --cc=gdt@gdt.id.au \
    --cc=jeff@garzik.org \
    --cc=jesse.brandeburg@intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lsorense@csclub.uwaterloo.ca \
    --cc=netdev@vger.kernel.org \
    --cc=rick.jones2@hp.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).