From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from brightrain.aerifal.cx (brightrain.aerifal.cx [216.12.86.13]) by sourceware.org (Postfix) with ESMTPS id A5745385840F for ; Mon, 25 Jul 2022 16:06:54 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org A5745385840F Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=libc.org Authentication-Results: sourceware.org; spf=none smtp.mailfrom=libc.org Date: Mon, 25 Jul 2022 12:06:53 -0400 From: Rich Felker To: "Jason A. Donenfeld" Cc: Florian Weimer , Yann Droneaud , jann@thejh.net, "Jason A. Donenfeld via Libc-alpha" , linux-crypto@vger.kernel.org, Michael@phoronix.com Subject: Re: arc4random - are you sure we want these? Message-ID: <20220725160652.GG7074@brightrain.aerifal.cx> References: <87bktdsdrk.fsf@oldenburg.str.redhat.com> <87v8rlqscj.fsf@oldenburg.str.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00, KAM_DMARC_STATUS, KAM_LAZY_DOMAIN_SECURITY, SPF_HELO_NONE, SPF_NONE, TXREP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 25 Jul 2022 16:06:58 -0000 On Mon, Jul 25, 2022 at 03:43:57PM +0200, Jason A. Donenfeld via Libc-alpha wrote: > Hi Florian, > > On Mon, Jul 25, 2022 at 02:39:24PM +0200, Florian Weimer wrote: > > Below you suggest to use GRND_INSECURE to avoid deadlocks during > > booting. It's documented in the UAPI header as “Return > > non-cryptographic random bytes”. I assume it's broadly equivalent to > > reading from /dev/urandom (which we need to support for backwards > > compatibility, and currently use to avoid blocking). This means that we > > cannot really document the resulting bits as cryptographically strong > > from an application perspective because the kernel is not willing to > > make this commitment. > > Regarding the technical aspect, GRND_INSECURE is somewhat new-ish, but > > as I wrote above, it's UAPI documentation is a bit scary. Maybe it > > would be possible to clarify this in the manual pages a bit? I *assume* > > that if we are willing to read from /dev/urandom, we can use > > GRND_INSECURE right away to avoid that fallback path on sufficiently new > > kernels. But it would be nice to have confirmation. > > getrandom(GRND_INSECURE) is the same as getrandom(0), except before the > RNG is seeded, in which case the former will return ~garbage randomness > while the latter will block. The only current difference between > getrandom(GRND_INSECURE) and /dev/urandom is the latter will try for a > second to do the jitter entropy thing if the RNG isn't seeded yet. > > I agree that the documentation around this is really bad. Actually, so > much of the documentation is out of date or confusing. Thanks for the > kick on this: I really do need to rewrite that / clean it up. > > So with my random.c maintainer hat on: getrandom(GRND_INSECURE) will > return the same "quality" randomness as getrandom(0), except before > the RNG is initialized. I'll fix up the docs for that, but feel free to > refer to this statement ahead of that if you need. > > Code-wise, the only relevant branch related to GRND_INSECURE is: > > if (!crng_ready() && !(flags & GRND_INSECURE)) { > if (flags & GRND_NONBLOCK) > return -EAGAIN; > ret = wait_for_random_bytes(); > if (unlikely(ret)) > return ret; > } > > That means: if it's not ready, and you didn't pass _INSECURE, and you > didn't pass _NONBLOCK, then wait for the RNG to be ready, and error out > if that's interrupted by a signal. Other than that one block, it > continues on to do the same thing as getrandom(0). > > With that said, however, I think it'd be nice if you used only blocking > randomness, and shove the initialization problem at init systems and > bootloaders and such. In 5.20, for example, there'll be an x86 boot > protocol for GRUB and kexec and hypervisors and such to pass a seed, and > since a long time, there exists a device tree attribute for the same. > Proliferating "unsafe" /dev/urandom-style usage doesn't seem good for > the ecosystem at large. And I'm in general interest in seeing progress > on decades long initialization-time seeding concerns. arc4random's contract is supposed to be that it always succeeds and always produces cryptographic output. It cannot use GRND_INSECURE or other insecure fallback methods to avoid blocking. It has to block. This function (inherently, in its contract) is not usable for early boot stuff where one is pretending to want actual cryptographic entropy but is just as happy getting some "high quality" non-CS stuff, and thereby would be just as happy with rand() or likely even with "42". Programs that will run in that context on Linux need to be explicitly aware of the messy "early boot" situation and figure out how they're going to handle it securely or if they even wanted CS randomness to begin with. Fortunately virtually nothing has to do that. On most (non-embedded) systems, init can just bring up a rw filesystem with saved entropy on it early and load that, then provide a fully-working environment to programs it invokes. > > I had some patches with AT_RANDOM fallback, including overwriting > > AT_RANDOM with output from the seeded PRNG. It's certainly messy. I > > probably didn't bother to post these patches given how bizarre the whole > > thing was. I did have fallback to CPU instructions, but that turned out > > to be unworkable due to bugs in suspend on AMD CPUs (kernel or firmware, > > unclear). > > Yea, it's kind of tricky as other things might be using AT_RANDOM also > and then you have a whole race issue and domain separation and whatnot. > The thing in systemd isn't really good for crypto -- no forward secrecy > and such -- but it's ostensibly better than random(). AT_RANDOM is unusable as a fallback here because it's equivalent to GRND_INSECURE. It's silently broken at early boot time. In musl we're likely going to end up using the legacy SYS_sysctl on pre-getrandom kernels even though it spammed syslog just because it seems to be the only way to get blocking secure entropy on those kernels. Rich