From: James Bottomley <James.Bottomley@HansenPartnership.com> To: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Cc: "Safford, David (GE Global Research, US)" <david.safford@ge.com>, Ken Goldman <kgold@linux.ibm.com>, Mimi Zohar <zohar@linux.ibm.com>, "linux-integrity@vger.kernel.org" <linux-integrity@vger.kernel.org>, "stable@vger.kernel.org" <stable@vger.kernel.org>, "open list:ASYMMETRIC KEYS" <keyrings@vger.kernel.org>, "open list:CRYPTO API" <linux-crypto@vger.kernel.org>, open list <linux-kernel@vger.kernel.org> Subject: Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes() Date: Wed, 16 Oct 2019 08:34:12 -0400 [thread overview] Message-ID: <1571229252.3477.7.camel@HansenPartnership.com> (raw) In-Reply-To: <20191016110031.GE10184@linux.intel.com> On Wed, 2019-10-16 at 14:00 +0300, Jarkko Sakkinen wrote: > On Mon, Oct 14, 2019 at 12:29:57PM -0700, James Bottomley wrote: > > The job of the in-kernel rng is simply to produce a mixed entropy > > pool from which we can draw random numbers. The idea is that quite > > a few attackers have identified the rng as being a weak point in > > the security architecture of the kernel, so if we mix entropy from > > all the sources we have, you have to compromise most of them to > > gain some predictive power over the rng sequence. > > The documentation says that krng is suitable for key generation. > Should the documentation changed to state that it is unsuitable? How do you get that from the argument above? The krng is about the best we have in terms of unpredictable key generation, so of course it is suitable ... provided you give the entropy enough time to have sufficient entropy. It's also not foolproof ... Bernstein did a speculation about how you could compromise all our input sources for entropy. However the more sources we have the more difficult the compromise becomes. > > The point is not how certified the TPM RNG is, the point is that > > it's a single source and if we rely on it solely for some > > applications, like trusted keys, then it gives the attackers a > > single known point to go after. This may be impossible for script > > kiddies, but it won't be for nation states ... are you going to > > exclusively trust the random number you got from your chinese > > certified TPM? > > I'd suggest approach where TPM RNG result is xored with krng result. reversible ciphers are generally frowned upon in random number generation, that's why the krng uses chacha20. In general I think we shouldn't try to code our own mixing and instead should get the krng to do it for us using whatever the algorithm du jour that the crypto guys have blessed is. That's why I proposed adding the TPM output to the krng as entropy input and then taking the output of the krng. James > > Remember also that the attack doesn't have to be to the TPM only, > > it could be the pathway by which we get the random number, which > > involves components outside of the TPM certification. > > Yeah, I do get this. > > /Jarkko >
next prev parent reply other threads:[~2019-10-16 12:34 UTC|newest] Thread overview: 58+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-09-26 17:16 Jarkko Sakkinen 2019-09-28 18:05 ` Jerry Snitselaar 2019-10-01 20:54 ` Jarkko Sakkinen 2019-10-02 14:00 ` Mimi Zohar 2019-10-03 11:41 ` Jarkko Sakkinen 2019-10-03 11:43 ` Jarkko Sakkinen 2019-10-03 13:02 ` Mimi Zohar 2019-10-03 17:58 ` Jarkko Sakkinen 2019-10-03 18:53 ` Mimi Zohar 2019-10-03 21:51 ` Jarkko Sakkinen 2019-10-03 21:57 ` Jarkko Sakkinen 2019-10-03 22:08 ` Mimi Zohar 2019-10-03 23:59 ` James Bottomley 2019-10-04 18:22 ` Jarkko Sakkinen 2019-10-04 18:24 ` James Bottomley 2019-10-04 18:33 ` Jerry Snitselaar 2019-10-04 18:42 ` James Bottomley 2019-10-04 20:07 ` Jerry Snitselaar 2019-10-04 20:11 ` Jerry Snitselaar 2019-10-04 22:11 ` James Bottomley 2019-10-06 0:38 ` Mimi Zohar 2019-10-06 23:52 ` Jarkko Sakkinen 2019-10-07 18:08 ` Mimi Zohar 2019-10-04 18:20 ` Jarkko Sakkinen 2019-10-03 22:10 ` Jarkko Sakkinen 2019-10-04 13:26 ` Safford, David (GE Global Research, US) 2019-10-04 18:27 ` Jarkko Sakkinen 2019-10-04 18:30 ` Jarkko Sakkinen 2019-10-04 19:56 ` Safford, David (GE Global Research, US) 2019-10-07 0:05 ` Jarkko Sakkinen 2019-10-07 22:13 ` Ken Goldman 2019-10-08 23:49 ` Jarkko Sakkinen 2019-10-08 23:53 ` Jarkko Sakkinen 2019-10-09 7:10 ` Pascal Van Leeuwen 2019-10-09 7:33 ` Jarkko Sakkinen 2019-10-09 7:41 ` Jarkko Sakkinen 2019-10-09 8:09 ` Pascal Van Leeuwen 2019-10-14 19:11 ` Jarkko Sakkinen 2019-10-09 8:02 ` Pascal Van Leeuwen 2019-10-09 12:11 ` Safford, David (GE Global Research, US) 2019-10-14 19:00 ` Jarkko Sakkinen 2019-10-14 19:29 ` Jarkko Sakkinen 2019-10-14 19:29 ` James Bottomley 2019-10-16 11:00 ` Jarkko Sakkinen 2019-10-16 12:34 ` James Bottomley [this message] 2019-10-16 16:25 ` Jarkko Sakkinen 2019-10-16 19:10 ` James Bottomley 2019-10-17 12:52 ` Sumit Garg 2019-10-17 12:58 ` James Bottomley 2019-10-17 18:04 ` Jarkko Sakkinen 2019-10-21 11:39 ` Jarkko Sakkinen 2019-10-29 8:42 ` Jarkko Sakkinen 2019-10-29 14:58 ` James Bottomley 2019-10-31 21:03 ` Jarkko Sakkinen 2019-10-18 7:32 ` Janne Karhunen 2019-10-03 18:02 ` Jarkko Sakkinen 2019-10-03 18:15 ` Jarkko Sakkinen 2019-10-07 10:33 ` Janne Karhunen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1571229252.3477.7.camel@HansenPartnership.com \ --to=james.bottomley@hansenpartnership.com \ --cc=david.safford@ge.com \ --cc=jarkko.sakkinen@linux.intel.com \ --cc=keyrings@vger.kernel.org \ --cc=kgold@linux.ibm.com \ --cc=linux-crypto@vger.kernel.org \ --cc=linux-integrity@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=stable@vger.kernel.org \ --cc=zohar@linux.ibm.com \ --subject='Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).