Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-20 Thread Herbert Xu
On Fri, Aug 19, 2016 at 10:20:18AM -0700, H. Peter Anvin wrote: > On 08/18/16 22:56, Herbert Xu wrote: > > On Thu, Aug 18, 2016 at 10:49:47PM -0400, Theodore Ts'o wrote: > >> > >> That really depends on the system. We can't assume that people are > >> using systems with a 100Hz clock interrupt. M

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-19 Thread H. Peter Anvin
On 08/18/16 22:56, Herbert Xu wrote: > On Thu, Aug 18, 2016 at 10:49:47PM -0400, Theodore Ts'o wrote: >> >> That really depends on the system. We can't assume that people are >> using systems with a 100Hz clock interrupt. More often than not >> people are using tickless kernels these days. That'

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-19 Thread Pavel Machek
Hi! > > From my point of view, it would make sense to factor time from RTC and > > mac addresses into the initial hash. Situation in the paper was so bad > > some devices had _completely identical_ keys. We should be able to do > > better than that. > > We fixed that **years** ago. In fact, the

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-18 Thread Herbert Xu
On Thu, Aug 18, 2016 at 10:49:47PM -0400, Theodore Ts'o wrote: > > That really depends on the system. We can't assume that people are > using systems with a 100Hz clock interrupt. More often than not > people are using tickless kernels these days. That's actually the > problem with changing /dev

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-18 Thread Theodore Ts'o
On Thu, Aug 18, 2016 at 08:39:23PM +0200, Pavel Machek wrote: > > But this is the scary part. Not limited to ssh. "We perform the > largest ever network survey of TLS and SSH servers and present > evidence that vulnerable keys are surprisingly widespread. We find > that 0.75% of TLS certificates s

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-18 Thread Pavel Machek
On Thu 2016-08-18 13:27:12, Theodore Ts'o wrote: > On Wed, Aug 17, 2016 at 11:42:55PM +0200, Pavel Machek wrote: > > > > Actually.. I'm starting to believe that getting enough entropy before > > userspace starts is more important than pretty much anything else. > > > > We only "need" 64-bits of e

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-18 Thread Theodore Ts'o
On Wed, Aug 17, 2016 at 11:42:55PM +0200, Pavel Machek wrote: > > Actually.. I'm starting to believe that getting enough entropy before > userspace starts is more important than pretty much anything else. > > We only "need" 64-bits of entropy, AFAICT. If it passes statistical > tests, I'd use it.

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-17 Thread Pavel Machek
Hi! > As far as whether or not you can gather enough entropy at boot time, > what we're really talking about how how much entropy we want to assume > can be gathered from interrupt timings, since what you do in your code > is not all that different from what the current random driver is > doing.

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-16 Thread Stephan Mueller
Am Dienstag, 16. August 2016, 15:28:45 CEST schrieb H. Peter Anvin: Hi Peter, > > > > There are two motivations for that: > > > > - the current /dev/random is compliant to NTG.1 from AIS 20/31 which > > requires (in brief words) that entropy comes from auditible noise > > sources. Currently in

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-16 Thread H. Peter Anvin
On 08/16/16 15:28, H. Peter Anvin wrote: > On 08/15/16 22:45, Stephan Mueller wrote: >> Am Montag, 15. August 2016, 13:42:54 CEST schrieb H. Peter Anvin: >> >> Hi H, >> >>> On 08/11/16 05:24, Stephan Mueller wrote: * prevent fast noise sources from dominating slow noise sources in

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-16 Thread H. Peter Anvin
On 08/15/16 22:45, Stephan Mueller wrote: > Am Montag, 15. August 2016, 13:42:54 CEST schrieb H. Peter Anvin: > > Hi H, > >> On 08/11/16 05:24, Stephan Mueller wrote: >>> * prevent fast noise sources from dominating slow noise sources >>> >>> in case of /dev/random >> >> Can someone please expl

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-15 Thread Stephan Mueller
Am Montag, 15. August 2016, 13:42:54 CEST schrieb H. Peter Anvin: Hi H, > On 08/11/16 05:24, Stephan Mueller wrote: > > * prevent fast noise sources from dominating slow noise sources > > > > in case of /dev/random > > Can someone please explain if and why this is actually desirable, and if >

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-15 Thread H. Peter Anvin
On 08/11/16 05:24, Stephan Mueller wrote: > * prevent fast noise sources from dominating slow noise sources > in case of /dev/random Can someone please explain if and why this is actually desirable, and if this assessment has been passed to someone who has actual experience with cryptography at

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-15 Thread Theodore Ts'o
On Mon, Aug 15, 2016 at 08:13:06AM +0200, Stephan Mueller wrote: > > According to my understanding of NAPI, the network card sends one interrupt > when receiving the first packet of a packet stream and then the driver goes > into polling mode, disabling the interrupt. So, I cannot see any batchi

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-14 Thread Stephan Mueller
Am Freitag, 12. August 2016, 15:22:08 CEST schrieb Theodore Ts'o: Hi Theodore, > On Fri, Aug 12, 2016 at 11:34:55AM +0200, Stephan Mueller wrote: > > - correlation: the interrupt noise source is closely correlated to the > > HID/ > > block noise sources. I see that the fast_pool somehow "smears"

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-12 Thread Theodore Ts'o
On Fri, Aug 12, 2016 at 11:34:55AM +0200, Stephan Mueller wrote: > > - correlation: the interrupt noise source is closely correlated to the HID/ > block noise sources. I see that the fast_pool somehow "smears" that > correlation. However, I have not seen a full assessment that the correlation >

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-12 Thread Stephan Mueller
Am Donnerstag, 11. August 2016, 17:36:32 CEST schrieb Theodore Ts'o: Hi Theodore, > On Thu, Aug 11, 2016 at 02:24:21PM +0200, Stephan Mueller wrote: > > The following patch set provides a different approach to /dev/random which > > I call Linux Random Number Generator (LRNG) to collect entropy w

Re: [PATCH v6 0/5] /dev/random - a new approach

2016-08-11 Thread Theodore Ts'o
On Thu, Aug 11, 2016 at 02:24:21PM +0200, Stephan Mueller wrote: > > The following patch set provides a different approach to /dev/random which > I call Linux Random Number Generator (LRNG) to collect entropy within the > Linux > kernel. The main improvements compared to the legacy /dev/random is

[PATCH v6 0/5] /dev/random - a new approach

2016-08-11 Thread Stephan Mueller
Hi Herbert, Ted, The following patch set provides a different approach to /dev/random which I call Linux Random Number Generator (LRNG) to collect entropy within the Linux kernel. The main improvements compared to the legacy /dev/random is to provide sufficient entropy during boot time as well as