Re: getrandom and getentropy

2020-05-12 Thread nia
On Tue, May 12, 2020 at 11:18:02AM -0400, Terry Moore wrote: > A useful definition requires that third-party code will not have surprising > security defects compared to their operation on other operating systems. There are other concerns for whether third party code works well.. I'll just copy w

Re: getrandom and getentropy

2020-05-12 Thread maya
On Tue, May 12, 2020 at 12:37:57PM +, nia wrote: > These use arandom exclusively on NetBSD: > - gnutls (via nettle _rnd_get_system_entropy) > Prefers getentropy and only uses getrandom if there's no getentropy. > - openssl (syscall_random) > Prefers getentropy and only uses getrandom if the

Re: Initial entropy with no HWRNG

2020-05-12 Thread Taylor R Campbell
[trimming cc list to tech-crypto] > Date: Tue, 12 May 2020 11:45:58 -0400 > From: Thor Lancelot Simon > > 1) It's hard to understand how many bits of entropy to assign to a >sample from one of these sources. [...] > >The delta estimator _was_ good for these things, particularly for >

Initial entropy with no HWRNG

2020-05-12 Thread Thor Lancelot Simon
On Tue, May 12, 2020 at 10:00:20AM +0300, Andreas Gustafsson wrote: > > Adding more sources could mean > reintroducing some timing based sources after careful analysis, but > also things like having the installer install an initial random seed > on the target machine (and if the installer itself la

Re: getrandom and getentropy

2020-05-12 Thread Michael van Elst
jo...@bec.de (Joerg Sonnenberger) writes: >Please think what that statement means. Consider for fun emulating a 20 >year old computer with a deterministic high precision model keeping all >storage in memory. There is no source of entropy in such a system and no >way for the emulation to tell. Sad

RE: getrandom and getentropy

2020-05-12 Thread Terry Moore
Andress Gustaffson wrote > But I do very much care that if I > accidentally try to generate an ssh key on a system that has no > entropy at all, it must not succeed. This above example is a question about ssh, not about the APIs getrandom() or getentropy(). A kernel API cannot solve requirements

Re: getrandom and getentropy

2020-05-12 Thread Joerg Sonnenberger
On Tue, May 12, 2020 at 04:59:52PM +0300, Andreas Gustafsson wrote: > I don't particularly care if we require 100 or 384 bits of estimated > entropy, nor do I particularly care if the entropy estimate of a > keystroke timestamp is 0 or 1 bit. But I do very much care that if I > accidentally try to

Re: getrandom and getentropy

2020-05-12 Thread Andreas Gustafsson
nia wrote: > I disagree that measuring "full entropy" is something that's possible > to do in a sane, fair, or uncontroversial way. Advocating the use of /dev/urandom and its equivalents on that basis basically boils down to "because we can't agree on what level of security we should require or ho

Re: getrandom and getentropy

2020-05-12 Thread nia
On Tue, May 12, 2020 at 10:00:20AM +0300, Andreas Gustafsson wrote: > This unfortunate situation should be addressed by providing more > entropy sources, not by burying our heads in the sand and pretending > we have entropy when we don't. Adding more sources could mean > reintroducing some timing

Randomness servers

2020-05-12 Thread Andreas Gustafsson
I have changed the subject line since this is veering off the original topic. Martin Husemann wrote: > On Tue, May 12, 2020 at 10:00:20AM +0300, Andreas Gustafsson wrote: > > we have entropy when we don't. Adding more sources could mean > > reintroducing some timing based sources after careful an

Re: getrandom and getentropy

2020-05-12 Thread Martin Husemann
On Tue, May 12, 2020 at 10:00:20AM +0300, Andreas Gustafsson wrote: > we have entropy when we don't. Adding more sources could mean > reintroducing some timing based sources after careful analysis, but > also things like having the installer install an initial random seed > on the target machine (

Re: getrandom and getentropy

2020-05-12 Thread Andreas Gustafsson
nia wrote: > > For the OpenBSD strategy to work, the system needs to actually refuse > > to run if the seed can't be loaded (or full entropy achieved in some > > other way). NetBSD doesn't do that. As long as there is any way > > userland can start before full entropy has been achieved, all APIs