看板FB_security
标 题Re: Proposed fix; stage 1 (Was: svn commit: r239569 - head/etc/rc.d)
发信站NCTU CS FreeBSD Server (Tue Sep 18 06:20:49 2012)
转信站ptt!csnews.cs.nctu!news.cs.nctu!.cs.nctucs.nctu!.org!ownorg!owner-free
--MAH+hnPXVZWQ5cD/
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Sun, Sep 16, 2012 at 05:21:21PM +0100, Mark Murray wrote:
> Hi
>=20
> Part 1 of the fix is enclosed; it involves drastically shortening the
> input into /dev/random (the "kickstart") at boot time. There are time
> implications that I'd like to hear any objections to.
>=20
> Part 1a is going to be tweeks to stashing entropy at restart
> (and possibly during normal running). Also fixes to zero-entropy
> first-startup.
>=20
> Part 2 will be a cheap shortening of files during reading so as not
> to clog up the harvest queue. The harvest queue will always be a bit
> intolerant of excess input via this route, so this should help a lot.
>=20
> Part 3 will be the addition of another choice of software PRNG;
> Fortuna. Fortuna is MUCH more resilient to attack, at the expense
> of using more kernel memory. For modern machines, this is scarcely
> noticeable, but it could be bad for embedded units.
>=20
> Tweeks along the way may include reverting to the original intent of
> starting the PRNG blocked, and only unblocking once reseeded.
>=20
> M
> --
> Mark R V Murray
> Pi: 132511160
> Index: initrandom
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> --- initrandom (revision 240384)
> +++ initrandom (working copy)
> @@ -23,15 +23,12 @@
> =20
> better_than_nothing()
> {
> - # XXX temporary until we can improve the entropy
> - # harvesting rate.
> # Entropy below is not great, but better than nothing.
> # This unblocks the generator at startup
> # Note: commands are ordered to cause the most variance across reboots.
> - ( kenv; dmesg; df -ib; ps -fauxww; date; sysctl -a ) \
> - | dd of=3D/dev/random bs=3D8k 2>/dev/null
> - /sbin/sha256 -q `sysctl -n kern.bootfile` \
> - | dd of=3D/dev/random bs=3D8k 2>/dev/null
> + for cmd in "kenv" "dmesg" "df -ib" "ps -fauxww" "date" "sysctl -ao" "ne=
tstat -arn" "fstat" ; do
> + ${cmd}| sha256 > /dev/random
> + done
I'd much prefer to just use sha512 here and also add -b to sysctl.
--=20
Pawel Jakub Dawidek
http://www.wheelsystems.com
FreeBSD committer
http://www.FreeBSD.org
Am I Evil? Yes, I Am!
http://tupytaj.pl
--MAH+hnPXVZWQ5cD/
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (FreeBSD)
iEYEARECAAYFAlBXhiAACgkQForvXbEpPzRENACfebpDcZizqdvOcJhMXXdFZdBB
QYAAn3zov0IRIJ3TDJ5gQSd1gE7Afwlo
=s/8t
-----END PGP SIGNATURE-----
--MAH+hnPXVZWQ5cD/--