On 09/18/2012 06:27 PM, Walter Stanish wrote:
> Hi there,
> 
> This is a bit general, rather than a specific suggestion, since I
> don't think I can make tomorrow's meeting maybe people might like to
> discuss it there.
> 
> Reading the more recent OpenSSL man page it occurred to me that there
> may be a potential with some types of daemons (such as recent OpenSSL
> run with the 2.x default of --key-method 2) to facilitate remote
> system entropy exhaustion as a type of DoS.
> 
> I am aware of entropy gathering daemons but none so much for entropy
> as an input to overall system management (connection throttling,
> control group freezing, etc.).
> 
> Has there been any attempt to integrate system entropy management with
> any major Linux distribution?
> Has Gentoo hardened looked at entropy impact of various packages?
> 
> I think there could be some research potential here.
> 
> The first step might be to establish suitably automated mechanisms for
> formal testing of package / package revision entropy impact under
> various test loads, with a view towards enhancing the visibility and
> ease of entropy management across hardened gentoo systems.
>  - I'm not sure if there is an automated test suite set up within the
> Gentoo infrastructure at present, though some packages have built-in
> tests, and some packages have a USE flag to enable/disable these, it
> seems difficult to re-run these tests after packages are emerged.
>  - There are also more general testing tools such as the Apache
> Project's 'ab' and 'bonnie++' that could be used for some types of
> packages.
> 
> Whilst it is easily possible to monitor entropy over time (eg: using
> rrdtool configured to source data from
> /proc/sys/kernel/random/entropy_avail) I have never heard of any
> attempt to monitor this availability over time and integrate it in to
> system management.  I have however heard of problems with relatively
> commonly deployed daemons (I forget which now, but not so long ago it
> happened to me too) wherein entropy exhaustion causes a complete
> functional DoS for a process blocking for unavailable entropy.
> 
> Perhaps a new control group implementation for maximum entropy draw
> rate per namespace might also be a useful contribution to the kernel?
> 
> I suppose this sort of thing is tending to increase in importance as
> the density of services per physical system increases under the
> continuing trend towards high density virtual hosting (either
> container based or paravirtualized).
> 
> First post here ... hope I'm not completely off track with this, just
> throwing the idea out there.
> 
> Cheers,
> Walter
> 

Like you said, there are some entropy gathering daemons (I use em in
VMs), so that's a good place to start I think.  After that, I would
probably go with some hardware rng solution if you determine this to be
that much of a risk.

Since you can keep http connections open for long periods of time with
HTTP/1.1 that can also be used to help mitigate some exhaustion (rate
limit people).  In fact, rate limiting in general is probably good.

-- 
-- Matthew Thode (prometheanfire)

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to