Re: [Users] virtio-rng / crypto inside vms

2013-12-15 Thread squadra
haveged is worth mentioning as pretty good alternative solution


http://www.issihosts.com/haveged/

Cheers,

Juergen


On Fri, Dec 13, 2013 at 9:32 AM, Sven Kieske s.kie...@mittwald.de wrote:

 Answering myself, it seems
 virtio-rng will be in 3.4:
 https://bugzilla.redhat.com/show_bug.cgi?id=977079

 But I don't find it in the planning:


 https://docs.google.com/spreadsheet/ccc?key=0AuAtmJW_VMCRdHJ6N1M3d1F1UTJTS1dSMnZwMF9XWVEusp=sharing#gid=0

 Nevertheless it would be cool if someone could give some advice
 how to handle entropy until 3.4 gets released
 (and I have time to upgrade).

 Am 13.12.2013 09:09, schrieb Sven Kieske:
  Hi,
 
  I'm just wondering: How is the state
  of the virtio-rng implementation?
 
  I'm asking because I need to regenerate
  ssh host keys in newly deployed vms.
 
  (I seem to be the only person, or everybody
  else has found the solution, or nobody thinks
  about security, or a mixture of the above?)
 
  Additional I found no really guidance
  on how much entropy bits should be
  available to generate a secure key
  inside a vm, beside these numbers:
 
  http://www.ietf.org/rfc/rfc1750.txt
  suggests about 128 bits of entropy
  for a single cryptographic operation.
 
  various other sources mention ranges
  between 100-200 or even at least 4096
  entropy bits.
 
  Would it be a workaround to add a virtual
  sound device and use this one for /dev/random ?
  (But it would be useless if you have no real sound hardware I guess).
 
  Additional when you want to regenerate host keys in e.g. Ubuntu
  3 Keys get generated so you need even more entropy to be on the
  save side.
 
  If you got any links to best practices or some
  good news regarding the state of virtio-rng that would be awesome.
 
  Currently my vms have around 130-160 entropy bits available.
 

 --
 Mit freundlichen Grüßen / Regards

 Sven Kieske

 Systemadministrator
 Mittwald CM Service GmbH  Co. KG
 Königsberger Straße 6
 32339 Espelkamp
 T: +49-5772-293-100
 F: +49-5772-293-333
 https://www.mittwald.de
 Geschäftsführer: Robert Meyer
 St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad Oeynhausen
 Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad Oeynhausen
 ___
 Users mailing list
 Users@ovirt.org
 http://lists.ovirt.org/mailman/listinfo/users




-- 

Sent from the Delta quadrant using Borg technology!
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


[Users] virtio-rng / crypto inside vms

2013-12-13 Thread Sven Kieske
Hi,

I'm just wondering: How is the state
of the virtio-rng implementation?

I'm asking because I need to regenerate
ssh host keys in newly deployed vms.

(I seem to be the only person, or everybody
else has found the solution, or nobody thinks
about security, or a mixture of the above?)

Additional I found no really guidance
on how much entropy bits should be
available to generate a secure key
inside a vm, beside these numbers:

http://www.ietf.org/rfc/rfc1750.txt
suggests about 128 bits of entropy
for a single cryptographic operation.

various other sources mention ranges
between 100-200 or even at least 4096
entropy bits.

Would it be a workaround to add a virtual
sound device and use this one for /dev/random ?
(But it would be useless if you have no real sound hardware I guess).

Additional when you want to regenerate host keys in e.g. Ubuntu
3 Keys get generated so you need even more entropy to be on the
save side.

If you got any links to best practices or some
good news regarding the state of virtio-rng that would be awesome.

Currently my vms have around 130-160 entropy bits available.
-- 
Mit freundlichen Grüßen / Regards

Sven Kieske

Systemadministrator
Mittwald CM Service GmbH  Co. KG
Königsberger Straße 6
32339 Espelkamp
T: +49-5772-293-100
F: +49-5772-293-333
https://www.mittwald.de
Geschäftsführer: Robert Meyer
St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad Oeynhausen
Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad Oeynhausen
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] virtio-rng / crypto inside vms

2013-12-13 Thread Sven Kieske
Answering myself, it seems
virtio-rng will be in 3.4:
https://bugzilla.redhat.com/show_bug.cgi?id=977079

But I don't find it in the planning:

https://docs.google.com/spreadsheet/ccc?key=0AuAtmJW_VMCRdHJ6N1M3d1F1UTJTS1dSMnZwMF9XWVEusp=sharing#gid=0

Nevertheless it would be cool if someone could give some advice
how to handle entropy until 3.4 gets released
(and I have time to upgrade).

Am 13.12.2013 09:09, schrieb Sven Kieske:
 Hi,
 
 I'm just wondering: How is the state
 of the virtio-rng implementation?
 
 I'm asking because I need to regenerate
 ssh host keys in newly deployed vms.
 
 (I seem to be the only person, or everybody
 else has found the solution, or nobody thinks
 about security, or a mixture of the above?)
 
 Additional I found no really guidance
 on how much entropy bits should be
 available to generate a secure key
 inside a vm, beside these numbers:
 
 http://www.ietf.org/rfc/rfc1750.txt
 suggests about 128 bits of entropy
 for a single cryptographic operation.
 
 various other sources mention ranges
 between 100-200 or even at least 4096
 entropy bits.
 
 Would it be a workaround to add a virtual
 sound device and use this one for /dev/random ?
 (But it would be useless if you have no real sound hardware I guess).
 
 Additional when you want to regenerate host keys in e.g. Ubuntu
 3 Keys get generated so you need even more entropy to be on the
 save side.
 
 If you got any links to best practices or some
 good news regarding the state of virtio-rng that would be awesome.
 
 Currently my vms have around 130-160 entropy bits available.
 

-- 
Mit freundlichen Grüßen / Regards

Sven Kieske

Systemadministrator
Mittwald CM Service GmbH  Co. KG
Königsberger Straße 6
32339 Espelkamp
T: +49-5772-293-100
F: +49-5772-293-333
https://www.mittwald.de
Geschäftsführer: Robert Meyer
St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad Oeynhausen
Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad Oeynhausen
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] virtio-rng / crypto inside vms

2013-12-13 Thread Andrew Cathrow
Entropy starvation isn't that common so for the vast majority of users it's not 
something that concerns them.
But obviously it's important enough that we invested in creating a 
paravirtualized solution.

RHEL 6.4 and 6.5 includes support within QEMU for virt-rng but not in libvirt.
RHEL 6.6 will pickup the appropriate libvirt support for virtio-rng and it is 
in RHEL 7 beta.
If I remember correctly it's in fedora 19 and later.
If you are compiling your own then you need a QEMU version 1.3 or later and 
libvirt 1.0.3 or later.

virt-rng is something we'd like to finish off in 3.4 it's effectively done 
already.
The challenge will be where it's supported - since EL6 hosts won't be able to 
use it unless we get creative.

If you're running on ovirt 3.2+ now with Fedora 19+ hosts then you can use a 
vdsm hook[1] to configure virt-rng for your guests.
The XML required to inject in the hook would be relatively simple[2]

On the topic of EL6 (before 6.6 comes out) then there is a way to work around 
this.
libvirt has a mechanism to pass through qemu command line options[3] . It's 
somewhere inbetween a great hack and a risky solution - but it's certainly 
helped up out many times. With this qemu namespace option in libvirt you could 
easily make it work in a custom hook on EL6.

Aic



[1] http://www.ovirt.org/VDSM-Hooks
[2] http://libvirt.org/formatdomain.html#elementsRng
[3] http://libvirt.org/drvqemu.html#qemucommand



- Original Message -
 From: Sven Kieske s.kie...@mittwald.de
 To: users@ovirt.org
 Sent: Friday, December 13, 2013 3:32:22 AM
 Subject: Re: [Users] virtio-rng / crypto inside vms
 
 Answering myself, it seems
 virtio-rng will be in 3.4:
 https://bugzilla.redhat.com/show_bug.cgi?id=977079
 
 But I don't find it in the planning:
 
 https://docs.google.com/spreadsheet/ccc?key=0AuAtmJW_VMCRdHJ6N1M3d1F1UTJTS1dSMnZwMF9XWVEusp=sharing#gid=0
 
 Nevertheless it would be cool if someone could give some advice
 how to handle entropy until 3.4 gets released
 (and I have time to upgrade).
 
 Am 13.12.2013 09:09, schrieb Sven Kieske:
  Hi,
  
  I'm just wondering: How is the state
  of the virtio-rng implementation?
  
  I'm asking because I need to regenerate
  ssh host keys in newly deployed vms.
  
  (I seem to be the only person, or everybody
  else has found the solution, or nobody thinks
  about security, or a mixture of the above?)
  
  Additional I found no really guidance
  on how much entropy bits should be
  available to generate a secure key
  inside a vm, beside these numbers:
  
  http://www.ietf.org/rfc/rfc1750.txt
  suggests about 128 bits of entropy
  for a single cryptographic operation.
  
  various other sources mention ranges
  between 100-200 or even at least 4096
  entropy bits.
  
  Would it be a workaround to add a virtual
  sound device and use this one for /dev/random ?
  (But it would be useless if you have no real sound hardware I
  guess).
  
  Additional when you want to regenerate host keys in e.g. Ubuntu
  3 Keys get generated so you need even more entropy to be on the
  save side.
  
  If you got any links to best practices or some
  good news regarding the state of virtio-rng that would be awesome.
  
  Currently my vms have around 130-160 entropy bits available.
  
 
 --
 Mit freundlichen Grüßen / Regards
 
 Sven Kieske
 
 Systemadministrator
 Mittwald CM Service GmbH  Co. KG
 Königsberger Straße 6
 32339 Espelkamp
 T: +49-5772-293-100
 F: +49-5772-293-333
 https://www.mittwald.de
 Geschäftsführer: Robert Meyer
 St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad
 Oeynhausen
 Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad
 Oeynhausen
 ___
 Users mailing list
 Users@ovirt.org
 http://lists.ovirt.org/mailman/listinfo/users

___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users