Commit 5c3b747e authored by Jason A. Donenfeld's avatar Jason A. Donenfeld

random: use first 128 bits of input as fast init

Before, the first 64 bytes of input, regardless of how entropic it was,
would be used to mutate the crng base key directly, and none of those
bytes would be credited as having entropy. Then 256 bits of credited
input would be accumulated, and only then would the rng transition from
the earlier "fast init" phase into being actually initialized.

The thinking was that by mixing and matching fast init and real init, an
attacker who compromised the fast init state, considered easy to do
given how little entropy might be in those first 64 bytes, would then be
able to bruteforce bits from the actual initialization. By keeping these
separate, bruteforcing became impossible.

However, by not crediting potentially creditable bits from those first 64
bytes of input, we delay initialization, and actually make the problem
worse, because it means the user is drawing worse random numbers for a
longer period of time.

Instead, we can take the first 128 bits as fast init, and allow them to
be credited, and then hold off on the next 128 bits until they've
accumulated. This is still a wide enough margin to prevent bruteforcing
the rng state, while still initializing much faster.

Then, rather than trying to piecemeal inject into the base crng key at
various points, instead just extract from the pool when we need it, for
the crng_init==0 phase. Performance may even be better for the various
inputs here, since there are likely more calls to mix_pool_bytes() then
there are to get_random_bytes() during this phase of system execution.

Since the preinit injection code is gone, bootloader randomness can then
do something significantly more straight forward, removing the weird
system_wq hack in hwgenerator randomness.

Cc: Theodore Ts'o <tytso@mit.edu>
Cc: Dominik Brodowski <linux@dominikbrodowski.net>
Signed-off-by: default avatarJason A. Donenfeld <Jason@zx2c4.com>
parent cbe89e5a
...@@ -232,10 +232,7 @@ static void _warn_unseeded_randomness(const char *func_name, void *caller, void ...@@ -232,10 +232,7 @@ static void _warn_unseeded_randomness(const char *func_name, void *caller, void
* *
*********************************************************************/ *********************************************************************/
enum { enum { CRNG_RESEED_INTERVAL = 300 * HZ };
CRNG_RESEED_INTERVAL = 300 * HZ,
CRNG_INIT_CNT_THRESH = 2 * CHACHA_KEY_SIZE
};
static struct { static struct {
u8 key[CHACHA_KEY_SIZE] __aligned(__alignof__(long)); u8 key[CHACHA_KEY_SIZE] __aligned(__alignof__(long));
...@@ -259,6 +256,8 @@ static DEFINE_PER_CPU(struct crng, crngs) = { ...@@ -259,6 +256,8 @@ static DEFINE_PER_CPU(struct crng, crngs) = {
/* Used by crng_reseed() to extract a new seed from the input pool. */ /* Used by crng_reseed() to extract a new seed from the input pool. */
static bool drain_entropy(void *buf, size_t nbytes, bool force); static bool drain_entropy(void *buf, size_t nbytes, bool force);
/* Used by crng_make_state() to extract a new seed when crng_init==0. */
static void extract_entropy(void *buf, size_t nbytes);
/* /*
* This extracts a new crng key from the input pool, but only if there is a * This extracts a new crng key from the input pool, but only if there is a
...@@ -383,17 +382,20 @@ static void crng_make_state(u32 chacha_state[CHACHA_STATE_WORDS], ...@@ -383,17 +382,20 @@ static void crng_make_state(u32 chacha_state[CHACHA_STATE_WORDS],
/* /*
* For the fast path, we check whether we're ready, unlocked first, and * For the fast path, we check whether we're ready, unlocked first, and
* then re-check once locked later. In the case where we're really not * then re-check once locked later. In the case where we're really not
* ready, we do fast key erasure with the base_crng directly, because * ready, we do fast key erasure with the base_crng directly, extracting
* this is what crng_pre_init_inject() mutates during early init. * when crng_init==0.
*/ */
if (!crng_ready()) { if (!crng_ready()) {
bool ready; bool ready;
spin_lock_irqsave(&base_crng.lock, flags); spin_lock_irqsave(&base_crng.lock, flags);
ready = crng_ready(); ready = crng_ready();
if (!ready) if (!ready) {
if (crng_init == 0)
extract_entropy(base_crng.key, sizeof(base_crng.key));
crng_fast_key_erasure(base_crng.key, chacha_state, crng_fast_key_erasure(base_crng.key, chacha_state,
random_data, random_data_len); random_data, random_data_len);
}
spin_unlock_irqrestore(&base_crng.lock, flags); spin_unlock_irqrestore(&base_crng.lock, flags);
if (!ready) if (!ready)
return; return;
...@@ -434,48 +436,6 @@ static void crng_make_state(u32 chacha_state[CHACHA_STATE_WORDS], ...@@ -434,48 +436,6 @@ static void crng_make_state(u32 chacha_state[CHACHA_STATE_WORDS],
local_unlock_irqrestore(&crngs.lock, flags); local_unlock_irqrestore(&crngs.lock, flags);
} }
/*
* This function is for crng_init == 0 only. It loads entropy directly
* into the crng's key, without going through the input pool. It is,
* generally speaking, not very safe, but we use this only at early
* boot time when it's better to have something there rather than
* nothing.
*
* If account is set, then the crng_init_cnt counter is incremented.
* This shouldn't be set by functions like add_device_randomness(),
* where we can't trust the buffer passed to it is guaranteed to be
* unpredictable (so it might not have any entropy at all).
*/
static void crng_pre_init_inject(const void *input, size_t len, bool account)
{
static int crng_init_cnt = 0;
struct blake2s_state hash;
unsigned long flags;
blake2s_init(&hash, sizeof(base_crng.key));
spin_lock_irqsave(&base_crng.lock, flags);
if (crng_init != 0) {
spin_unlock_irqrestore(&base_crng.lock, flags);
return;
}
blake2s_update(&hash, base_crng.key, sizeof(base_crng.key));
blake2s_update(&hash, input, len);
blake2s_final(&hash, base_crng.key);
if (account) {
crng_init_cnt += min_t(size_t, len, CRNG_INIT_CNT_THRESH - crng_init_cnt);
if (crng_init_cnt >= CRNG_INIT_CNT_THRESH)
crng_init = 1;
}
spin_unlock_irqrestore(&base_crng.lock, flags);
if (crng_init == 1)
pr_notice("fast init done\n");
}
static void _get_random_bytes(void *buf, size_t nbytes) static void _get_random_bytes(void *buf, size_t nbytes)
{ {
u32 chacha_state[CHACHA_STATE_WORDS]; u32 chacha_state[CHACHA_STATE_WORDS];
...@@ -788,7 +748,8 @@ EXPORT_SYMBOL(get_random_bytes_arch); ...@@ -788,7 +748,8 @@ EXPORT_SYMBOL(get_random_bytes_arch);
enum { enum {
POOL_BITS = BLAKE2S_HASH_SIZE * 8, POOL_BITS = BLAKE2S_HASH_SIZE * 8,
POOL_MIN_BITS = POOL_BITS /* No point in settling for less. */ POOL_MIN_BITS = POOL_BITS, /* No point in settling for less. */
POOL_FAST_INIT_BITS = POOL_MIN_BITS / 2
}; };
/* For notifying userspace should write into /dev/random. */ /* For notifying userspace should write into /dev/random. */
...@@ -825,24 +786,6 @@ static void mix_pool_bytes(const void *in, size_t nbytes) ...@@ -825,24 +786,6 @@ static void mix_pool_bytes(const void *in, size_t nbytes)
spin_unlock_irqrestore(&input_pool.lock, flags); spin_unlock_irqrestore(&input_pool.lock, flags);
} }
static void credit_entropy_bits(size_t nbits)
{
unsigned int entropy_count, orig, add;
if (!nbits)
return;
add = min_t(size_t, nbits, POOL_BITS);
do {
orig = READ_ONCE(input_pool.entropy_count);
entropy_count = min_t(unsigned int, POOL_BITS, orig + add);
} while (cmpxchg(&input_pool.entropy_count, orig, entropy_count) != orig);
if (!crng_ready() && entropy_count >= POOL_MIN_BITS)
crng_reseed(false);
}
/* /*
* This is an HKDF-like construction for using the hashed collected entropy * This is an HKDF-like construction for using the hashed collected entropy
* as a PRF key, that's then expanded block-by-block. * as a PRF key, that's then expanded block-by-block.
...@@ -908,6 +851,33 @@ static bool drain_entropy(void *buf, size_t nbytes, bool force) ...@@ -908,6 +851,33 @@ static bool drain_entropy(void *buf, size_t nbytes, bool force)
return true; return true;
} }
static void credit_entropy_bits(size_t nbits)
{
unsigned int entropy_count, orig, add;
unsigned long flags;
if (!nbits)
return;
add = min_t(size_t, nbits, POOL_BITS);
do {
orig = READ_ONCE(input_pool.entropy_count);
entropy_count = min_t(unsigned int, POOL_BITS, orig + add);
} while (cmpxchg(&input_pool.entropy_count, orig, entropy_count) != orig);
if (!crng_ready() && entropy_count >= POOL_MIN_BITS)
crng_reseed(false);
else if (unlikely(crng_init == 0 && entropy_count >= POOL_FAST_INIT_BITS)) {
spin_lock_irqsave(&base_crng.lock, flags);
if (crng_init == 0) {
extract_entropy(base_crng.key, sizeof(base_crng.key));
crng_init = 1;
}
spin_unlock_irqrestore(&base_crng.lock, flags);
}
}
/********************************************************************** /**********************************************************************
* *
...@@ -951,9 +921,9 @@ static bool drain_entropy(void *buf, size_t nbytes, bool force) ...@@ -951,9 +921,9 @@ static bool drain_entropy(void *buf, size_t nbytes, bool force)
* entropy as specified by the caller. If the entropy pool is full it will * entropy as specified by the caller. If the entropy pool is full it will
* block until more entropy is needed. * block until more entropy is needed.
* *
* add_bootloader_randomness() is the same as add_hwgenerator_randomness() or * add_bootloader_randomness() is called by bootloader drivers, such as EFI
* add_device_randomness(), depending on whether or not the configuration * and device tree, and credits its input depending on whether or not the
* option CONFIG_RANDOM_TRUST_BOOTLOADER is set. * configuration option CONFIG_RANDOM_TRUST_BOOTLOADER is set.
* *
* add_vmfork_randomness() adds a unique (but not necessarily secret) ID * add_vmfork_randomness() adds a unique (but not necessarily secret) ID
* representing the current instance of a VM to the pool, without crediting, * representing the current instance of a VM to the pool, without crediting,
...@@ -1069,9 +1039,6 @@ void add_device_randomness(const void *buf, size_t size) ...@@ -1069,9 +1039,6 @@ void add_device_randomness(const void *buf, size_t size)
unsigned long entropy = random_get_entropy(); unsigned long entropy = random_get_entropy();
unsigned long flags; unsigned long flags;
if (crng_init == 0 && size)
crng_pre_init_inject(buf, size, false);
spin_lock_irqsave(&input_pool.lock, flags); spin_lock_irqsave(&input_pool.lock, flags);
_mix_pool_bytes(&entropy, sizeof(entropy)); _mix_pool_bytes(&entropy, sizeof(entropy));
_mix_pool_bytes(buf, size); _mix_pool_bytes(buf, size);
...@@ -1187,12 +1154,6 @@ void rand_initialize_disk(struct gendisk *disk) ...@@ -1187,12 +1154,6 @@ void rand_initialize_disk(struct gendisk *disk)
void add_hwgenerator_randomness(const void *buffer, size_t count, void add_hwgenerator_randomness(const void *buffer, size_t count,
size_t entropy) size_t entropy)
{ {
if (unlikely(crng_init == 0 && entropy < POOL_MIN_BITS)) {
crng_pre_init_inject(buffer, count, true);
mix_pool_bytes(buffer, count);
return;
}
/* /*
* Throttle writing if we're above the trickle threshold. * Throttle writing if we're above the trickle threshold.
* We'll be woken up again once below POOL_MIN_BITS, when * We'll be woken up again once below POOL_MIN_BITS, when
...@@ -1200,7 +1161,7 @@ void add_hwgenerator_randomness(const void *buffer, size_t count, ...@@ -1200,7 +1161,7 @@ void add_hwgenerator_randomness(const void *buffer, size_t count,
* CRNG_RESEED_INTERVAL has elapsed. * CRNG_RESEED_INTERVAL has elapsed.
*/ */
wait_event_interruptible_timeout(random_write_wait, wait_event_interruptible_timeout(random_write_wait,
!system_wq || kthread_should_stop() || kthread_should_stop() ||
input_pool.entropy_count < POOL_MIN_BITS, input_pool.entropy_count < POOL_MIN_BITS,
CRNG_RESEED_INTERVAL); CRNG_RESEED_INTERVAL);
mix_pool_bytes(buffer, count); mix_pool_bytes(buffer, count);
...@@ -1209,17 +1170,14 @@ void add_hwgenerator_randomness(const void *buffer, size_t count, ...@@ -1209,17 +1170,14 @@ void add_hwgenerator_randomness(const void *buffer, size_t count,
EXPORT_SYMBOL_GPL(add_hwgenerator_randomness); EXPORT_SYMBOL_GPL(add_hwgenerator_randomness);
/* /*
* Handle random seed passed by bootloader. * Handle random seed passed by bootloader, and credit it if
* If the seed is trustworthy, it would be regarded as hardware RNGs. Otherwise * CONFIG_RANDOM_TRUST_BOOTLOADER is set.
* it would be regarded as device data.
* The decision is controlled by CONFIG_RANDOM_TRUST_BOOTLOADER.
*/ */
void add_bootloader_randomness(const void *buf, size_t size) void add_bootloader_randomness(const void *buf, size_t size)
{ {
mix_pool_bytes(buf, size);
if (trust_bootloader) if (trust_bootloader)
add_hwgenerator_randomness(buf, size, size * 8); credit_entropy_bits(size * 8);
else
add_device_randomness(buf, size);
} }
EXPORT_SYMBOL_GPL(add_bootloader_randomness); EXPORT_SYMBOL_GPL(add_bootloader_randomness);
...@@ -1353,13 +1311,8 @@ static void mix_interrupt_randomness(struct work_struct *work) ...@@ -1353,13 +1311,8 @@ static void mix_interrupt_randomness(struct work_struct *work)
fast_pool->last = jiffies; fast_pool->last = jiffies;
local_irq_enable(); local_irq_enable();
if (unlikely(crng_init == 0)) { mix_pool_bytes(pool, sizeof(pool));
crng_pre_init_inject(pool, sizeof(pool), true); credit_entropy_bits(1);
mix_pool_bytes(pool, sizeof(pool));
} else {
mix_pool_bytes(pool, sizeof(pool));
credit_entropy_bits(1);
}
memzero_explicit(pool, sizeof(pool)); memzero_explicit(pool, sizeof(pool));
} }
...@@ -1381,8 +1334,7 @@ void add_interrupt_randomness(int irq) ...@@ -1381,8 +1334,7 @@ void add_interrupt_randomness(int irq)
if (new_count & MIX_INFLIGHT) if (new_count & MIX_INFLIGHT)
return; return;
if (new_count < 64 && (!time_is_before_jiffies(fast_pool->last + HZ) || if (new_count < 64 && !time_is_before_jiffies(fast_pool->last + HZ))
unlikely(crng_init == 0)))
return; return;
if (unlikely(!fast_pool->mix.func)) if (unlikely(!fast_pool->mix.func))
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment