Re: Handling of entropy during boot

2019-09-11 Thread Ben Hutchings
On Wed, 2019-09-11 at 15:52 -0400, Paul Thomas wrote: > Hi All, > > First off, I want to acknowledge how great system Debian is, very nice work! > > I know the issue with Entropy Starvation is understood, and I > understand the security concern: >

Re: Handling of entropy during boot

2019-09-11 Thread Paul Thomas
Hi All, First off, I want to acknowledge how great system Debian is, very nice work! I know the issue with Entropy Starvation is understood, and I understand the security concern: https://wiki.debian.org/BoottimeEntropyStarvation https://daniel-lange.com/archives/152-hello-buster.html However,

Re: Handling of entropy during boot

2019-02-12 Thread Ben Hutchings
On Mon, 2019-01-21 at 21:46 +, Ben Hutchings wrote: > On Mon, 2019-01-21 at 20:49 +, Andy Simpkins wrote: > [...] > > Should we add to or change the possible entropy sources? > [...] > > Yes, we should (by default) enable use of available hardware RNGs to > produce entropy and if none is

Re: Handling of entropy during boot

2019-01-21 Thread Ben Hutchings
On Mon, 2019-01-21 at 20:49 +, Andy Simpkins wrote: [...] > Should we add to or change the possible entropy sources? [...] Yes, we should (by default) enable use of available hardware RNGs to produce entropy and if none is available then we should (by default) install one of the various

Re: Handling of entropy during boot

2019-01-21 Thread Andy Simpkins
Hi, This thread seems to have gone quite for some time. Re-Reading the thread I don't see any solutions being proposed that will truly suit everyone. If I have correctly understood the problem we are seeing a change from a more open and trusting software environment to one with more emphasis on

Re: Handling of entropy during boot

2019-01-16 Thread Marco d'Itri
On Jan 16, Guido Günther wrote: > There's also jitterentropy-rngd which does the trick but I haven't > looked at the security implications. Nowadays rngd collects jitter entropy, so I would not use something else. -- ciao, Marco signature.asc Description: PGP signature

Re: Handling of entropy during boot

2019-01-16 Thread Luca Boccassi
On Wed, 2019-01-16 at 11:05 +0100, Guido Günther wrote: > Hi, > On Mon, Jan 14, 2019 at 05:56:20PM +0100, W. Martin Borgert wrote: > > Quoting Michael Stone : > > > Unless the cpu supports rdrand/rdseed, installing rng-tools5 > > > won't > > > really change anything. If it does support those, it

Re: Handling of entropy during boot

2019-01-16 Thread Guido Günther
Hi, On Mon, Jan 14, 2019 at 05:56:20PM +0100, W. Martin Borgert wrote: > Quoting Michael Stone : > > Unless the cpu supports rdrand/rdseed, installing rng-tools5 won't > > really change anything. If it does support those, it probably makes more > > sense going forward to just enable

Re: Handling of entropy during boot

2019-01-15 Thread Anthony DeRobertis
On 1/14/19 7:07 AM, Thomas Goirand wrote: On 12/18/18 8:11 PM, Theodore Y. Ts'o wrote: If you are firmly convinced that there is a good chance that the NSA has suborned Intel in putting a backdoor into RDRAND, you won't want to use that boot option. I have read numerous times that some people

Re: Handling of entropy during boot

2019-01-14 Thread Michael Stone
On January 14, 2019 11:56:20 AM EST, "W. Martin Borgert" wrote: >Quoting Michael Stone : >> Unless the cpu supports rdrand/rdseed, installing rng-tools5 won't >> really change anything. If it does support those, it probably makes >> more sense going forward to just enable

Re: Handling of entropy during boot

2019-01-14 Thread W. Martin Borgert
Quoting Michael Stone : Unless the cpu supports rdrand/rdseed, installing rng-tools5 won't really change anything. If it does support those, it probably makes more sense going forward to just enable CONFIG_RANDOM_TRUST_CPU rather than installing another package. This option is only

Re: Re: Handling of entropy during boot

2019-01-14 Thread Alexander E. Patrakov
Sam Hartman wrote: "Marco" == Marco d'Itri writes: Marco> online. Is it enough to feed the host side of virtio-rng Marco> with /dev/random or should everybody who has virtual machines Marco> also install rngd in the host? Is rngd to be preferred to Marco> haveged? I'd also

Re: Handling of entropy during boot

2019-01-14 Thread Michael Stone
On Mon, Jan 14, 2019 at 12:55:09PM +0100, Marco d'Itri wrote: Agreed. I think that d-i should install rngd (or haveged? And why?) if it detects a virtualized environment without virtio-rng. Unless the cpu supports rdrand/rdseed, installing rng-tools5 won't really change anything. If it does

Re: Handling of entropy during boot

2019-01-14 Thread Thomas Goirand
On 12/18/18 8:11 PM, Theodore Y. Ts'o wrote: > If you are firmly convinced that there is a good > chance that the NSA has suborned Intel in putting a backdoor into > RDRAND, you won't want to use that boot option. I have read numerous times that some people trust this or that part of the

Re: Handling of entropy during boot

2019-01-14 Thread Marco d'Itri
On Jan 13, Sam Hartman wrote: > I recently discovered that Vmware appears to have no virtual RNG > available to the guest at all. AFAIK you are right. > A buster vmware guest will boot but will be unable to start sshd because > of lack of entropy for typically five minutes or so. > A lot of

Re: Handling of entropy during boot

2019-01-13 Thread Sam Hartman
> "Marco" == Marco d'Itri writes: Marco> online. Is it enough to feed the host side of virtio-rng Marco> with /dev/random or should everybody who has virtual machines Marco> also install rngd in the host? Is rngd to be preferred to Marco> haveged? I'd also like to point

Re: Handling of entropy during boot

2019-01-13 Thread Marco d'Itri
On Jan 09, "Theodore Y. Ts'o" wrote: > x86 systems have a high resolution timer; Rasberry PI's don't. > Furthermore, if libvirt is miconfigured, it should just be fixed (and > better yet, it should be configured to enable virtio-rng, which is > *not* hard). Can you clarify what is the best

Re: Handling of entropy during boot

2019-01-10 Thread Michael Stone
On Thu, Jan 10, 2019 at 03:57:00PM +0100, Michael Biebl wrote: with possible solutions like installing haveged It still isn't clear to me that this is actually secure, so I'm not sure we should be telling people to do it in release notes. Mike Stone

Re: Handling of entropy during boot

2019-01-10 Thread Stefan Fritsch
On Thu, 10 Jan 2019, Michael Biebl wrote: > Am 10.01.19 um 15:51 schrieb Stefan Fritsch: > > On Thu, 10 Jan 2019, Michael Biebl wrote: > >>> ACK, we also had to do the same in Grml[.org] and our latest release > >>> (2018.12). Now we automatically enable haveged when users boot using > >>> the

Re: Handling of entropy during boot

2019-01-10 Thread Michael Biebl
Am 10.01.19 um 15:51 schrieb Stefan Fritsch: > On Thu, 10 Jan 2019, Michael Biebl wrote: >>> ACK, we also had to do the same in Grml[.org] and our latest release >>> (2018.12). Now we automatically enable haveged when users boot using >>> the ssh boot option (which is something Grml specific,

Re: Handling of entropy during boot

2019-01-10 Thread Stefan Fritsch
On Thu, 10 Jan 2019, Michael Biebl wrote: > > ACK, we also had to do the same in Grml[.org] and our latest release > > (2018.12). Now we automatically enable haveged when users boot using > > the ssh boot option (which is something Grml specific, taking care > > of setting user password and

Re: Handling of entropy during boot

2019-01-10 Thread Stefan Fritsch
On Wed, 9 Jan 2019, Theodore Y. Ts'o wrote: > On Wed, Jan 09, 2019 at 09:58:22AM +0100, Stefan Fritsch wrote: > > > > There have been a number of bug reports and blog posts about this, despite > > buster not being release yet. So it's not that uncommon. > > Pointers, please? Let's see them

Re: Handling of entropy during boot

2019-01-10 Thread Michael Biebl
Am 10.01.19 um 14:23 schrieb Michael Prokop: > * Raphael Hertzog [Thu Jan 10, 2019 at 12:24:45PM +0100]: >> On Wed, 09 Jan 2019, Theodore Y. Ts'o wrote: > >>> Pointers, please? Let's see them and investigate. The primary issue >>> I've been aware of to date has been on Fedora systems, and it's

Re: Handling of entropy during boot

2019-01-10 Thread Michael Prokop
* Raphael Hertzog [Thu Jan 10, 2019 at 12:24:45PM +0100]: > On Wed, 09 Jan 2019, Theodore Y. Ts'o wrote: > > Pointers, please? Let's see them and investigate. The primary issue > > I've been aware of to date has been on Fedora systems, and it's due to > > some Red Hat specific changes that they

Re: Handling of entropy during boot

2019-01-10 Thread Raphael Hertzog
Hi, On Wed, 09 Jan 2019, Theodore Y. Ts'o wrote: > Pointers, please? Let's see them and investigate. The primary issue > I've been aware of to date has been on Fedora systems, and it's due to > some Red Hat specific changes that they made for FEDRAMP compliance > --- and Red Hat has dealt with

Re: Handling of entropy during boot

2019-01-09 Thread Theodore Y. Ts'o
On Tue, Jan 08, 2019 at 10:41:55AM +0100, Stefan Fritsch wrote: > > If the security issue only affects a small percentage of the installations > and fixing it means breaking many other installations, then there has to > be a discussion if we really want fix the issue or if a "don't do that" >

Re: Handling of entropy during boot

2019-01-09 Thread Ben Hutchings
On Wed, 2019-01-09 at 11:40 -0500, Theodore Y. Ts'o wrote: > On Wed, Jan 09, 2019 at 09:58:22AM +0100, Stefan Fritsch wrote: [...] > > No, that's utterly wrong. If it's a hassle to use good entropy, people > > will use gettimeofday() for getting "entropy" and they will use it for > > security

Re: Handling of entropy during boot

2019-01-09 Thread Matt Zagrabelny
On Wed, Jan 9, 2019 at 12:13 PM Theodore Y. Ts'o wrote: > On Wed, Jan 09, 2019 at 09:58:22AM +0100, Stefan Fritsch wrote: > > > > There have been a number of bug reports and blog posts about this, > despite > > buster not being release yet. So it's not that uncommon. > > Pointers, please? Let's

Re: Handling of entropy during boot

2019-01-09 Thread Theodore Y. Ts'o
On Wed, Jan 09, 2019 at 09:58:22AM +0100, Stefan Fritsch wrote: > > There have been a number of bug reports and blog posts about this, despite > buster not being release yet. So it's not that uncommon. Pointers, please? Let's see them and investigate. The primary issue I've been aware of to

Re: Handling of entropy during boot

2019-01-09 Thread Stefan Fritsch
On Tue, 8 Jan 2019, Theodore Y. Ts'o wrote: > On Tue, Jan 08, 2019 at 10:41:55AM +0100, Stefan Fritsch wrote: > > > > If the security issue only affects a small percentage of the installations > > and fixing it means breaking many other installations, then there has to > > be a discussion if

Re: Handling of entropy during boot

2019-01-08 Thread Stefan Fritsch
On Sun, 23 Dec 2018, Theodore Y. Ts'o wrote: > On Sun, Dec 23, 2018 at 05:52:31PM +0100, Stefan Fritsch wrote: > > I think some other questions should be considered first. Did Debian protect > > from these attacks in the past? The answer is clearly no. Now, should we > > break > > the systems

Re: Handling of entropy during boot

2018-12-24 Thread Theodore Y. Ts'o
On Sun, Dec 23, 2018 at 05:52:31PM +0100, Stefan Fritsch wrote: > I think some other questions should be considered first. Did Debian protect > from these attacks in the past? The answer is clearly no. Now, should we > break > the systems of those people who keep their random-seed file secret

Re: Handling of entropy during boot

2018-12-23 Thread Stefan Fritsch
On Tuesday, 18 December 2018 20:11:58 CET you wrote: > On Mon, Dec 17, 2018 at 09:46:42PM +0100, Stefan Fritsch wrote: > > There is a random seed file stored by systemd-random-seed.service that > > saves entropy from one boot and loads it again after the next reboot. The > > random seed file is

Re: Handling of entropy during boot

2018-12-18 Thread Theodore Y. Ts'o
On Mon, Dec 17, 2018 at 09:46:42PM +0100, Stefan Fritsch wrote: > > There is a random seed file stored by systemd-random-seed.service that saves > entropy from one boot and loads it again after the next reboot. The random > seed file is re-written immediately after the file is read, so the