1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-21 11:13:30 +00:00
Mirror of the FreeBSD src repository https://git.FreeBSD.org/src.git .
Go to file
Conrad Meyer 13774e8228 random(4): Block read_random(9) on initial seeding
read_random() is/was used, mostly without error checking, in a lot of
very sensitive places in the kernel -- including seeding the widely used
arc4random(9).

Most uses, especially arc4random(9), should block until the device is seeded
rather than proceeding with a bogus or empty seed.  I did not spy any
obvious kernel consumers where blocking would be inappropriate (in the
sense that lack of entropy would be ok -- I did not investigate locking
angle thoroughly).  In many instances, arc4random_buf(9) or that family
of APIs would be more appropriate anyway; that work was done in r345865.

A minor cleanup was made to the implementation of the READ_RANDOM function:
instead of using a variable-length array on the stack to temporarily store
all full random blocks sufficient to satisfy the requested 'len', only store
a single block on the stack.  This has some benefit in terms of reducing
stack usage, reducing memcpy overhead and reducing devrandom output leakage
via the stack.  Additionally, the stack block is now safely zeroed if it was
used.

One caveat of this change is that the kern.arandom sysctl no longer returns
zero bytes immediately if the random device is not seeded.  This means that
FreeBSD-specific userspace applications which attempted to handle an
unseeded random device may be broken by this change.  If such behavior is
needed, it can be replaced by the more portable getrandom(2) GRND_NONBLOCK
option.

On any typical FreeBSD system, entropy is persisted on read/write media and
used to seed the random device very early in boot, and blocking is never a
problem.

This change primarily impacts the behavior of /dev/random on embedded
systems with read-only media that do not configure "nodevice random".  We
toggle the default from 'charge on blindly with no entropy' to 'block
indefinitely.'  This default is safer, but may cause frustration.  Embedded
system designers using FreeBSD have several options.  The most obvious is to
plan to have a small writable NVRAM or NAND to persist entropy, like larger
systems.  Early entropy can be fed from any loader, or by writing directly
to /dev/random during boot.  Some embedded SoCs now provide a fast hardware
entropy source; this would also work for quickly seeding Fortuna.  A 3rd
option would be creating an embedded-specific, more simplistic random
module, like that designed by DJB in [1] (this design still requires a small
rewritable media for forward secrecy).  Finally, the least preferred option
might be "nodevice random", although I plan to remove this in a subsequent
revision.

To help developers emulate the behavior of these embedded systems on
ordinary workstations, the tunable kern.random.block_seeded_status was
added.  When set to 1, it blocks the random device.

I attempted to document this change in random.4 and random.9 and ran into a
bunch of out-of-date or irrelevant or inaccurate content and ended up
rototilling those documents more than I intended to.  Sorry.  I think
they're in a better state now.

PR:		230875
Reviewed by:	delphij, markm (earlier version)
Approved by:	secteam(delphij), devrandom(markm)
Relnotes:	yes
Differential Revision:	https://reviews.freebsd.org/D19744
2019-04-15 18:40:36 +00:00
bin .Xr trim(8) from dd(1). 2019-03-26 15:44:06 +00:00
cddl Make zfsd(8) build obey CFLAGS. 2019-04-10 13:42:37 +00:00
contrib Update mandoc to 1.14.5 2019-04-12 10:13:17 +00:00
crypto Add workaround for a QoS-related bug in VMWare Workstation. 2019-03-27 15:17:29 +00:00
etc Compile and install most of the googletest examples 2019-03-11 19:50:44 +00:00
gnu Fix gdb/kgdb build under WITH_PIE 2019-04-01 19:19:51 +00:00
include Introduce funlinkat syscall that always us to check if we are removing 2019-04-06 09:34:26 +00:00
kerberos5
lib Fix order of destructors between main binary and libraries. 2019-04-15 13:03:09 +00:00
libexec Fix order of destructors between main binary and libraries. 2019-04-15 13:03:09 +00:00
release Add support for cross-building cloudware images. 2019-04-03 21:54:47 +00:00
rescue
sbin Don't cast result from malloc(). 2019-04-15 06:33:05 +00:00
secure Add workaround for a QoS-related bug in VMWare Workstation. 2019-03-27 15:17:29 +00:00
share random(4): Block read_random(9) on initial seeding 2019-04-15 18:40:36 +00:00
stand stand: refactor overlay loading a little bit 2019-04-11 13:26:28 +00:00
sys random(4): Block read_random(9) on initial seeding 2019-04-15 18:40:36 +00:00
targets
tests netmap: add test cases for multiple host rings 2019-04-13 12:50:47 +00:00
tools Add a smoke test QEMU boot script for CI 2019-04-10 13:41:34 +00:00
usr.bin Fix printing of the line that starts with "LocalOpen...". 2019-04-13 23:26:02 +00:00
usr.sbin Revert r345171 pending review 2019-04-13 23:37:27 +00:00
.arcconfig
.arclint
.cirrus.yml Cirrus-CI: pass OVMF env var to test script for upcoming changes 2019-04-11 13:01:26 +00:00
.gitattributes
.gitignore
COPYRIGHT
LOCKS
MAINTAINERS Update maintainers for libunwind and lldb. 2019-03-16 13:26:42 +00:00
Makefile Fix a typo when sanity checking in the bootstrap-tools target 2019-04-09 16:17:31 +00:00
Makefile.inc1 pkgbase: Use uname as ABI_FILE 2019-03-27 17:55:39 +00:00
Makefile.libcompat
Makefile.sys.inc
ObsoleteFiles.inc Set tentative merge date, and bump __FreeBSD_version. 2019-03-04 19:23:11 +00:00
README
README.md
UPDATING Add an entry to UPDATING for r345895, which affects the use of nfsuserd daemons 2019-04-04 23:40:30 +00:00

FreeBSD Source:

This is the top level of the FreeBSD source directory. This file was last revised on: FreeBSD

FreeBSD is an operating system used to power modern servers, desktops, and embedded platforms. A large community has continually developed it for more than thirty years. Its advanced networking, security, and storage features have made FreeBSD the platform of choice for many of the busiest web sites and most pervasive embedded networking and storage devices.

For copyright information, please see the file COPYRIGHT in this directory. Additional copyright information also exists for some sources in this tree - please see the specific source directories for more information.

The Makefile in this directory supports a number of targets for building components (or all) of the FreeBSD source tree. See build(7), config(8), https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/makeworld.html, and https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/kernelconfig.html for more information, including setting make(1) variables.

Source Roadmap:

bin		System/user commands.

cddl		Various commands and libraries under the Common Development
		and Distribution License.

contrib		Packages contributed by 3rd parties.

crypto		Cryptography stuff (see crypto/README).

etc		Template files for /etc.

gnu		Various commands and libraries under the GNU Public License.
		Please see gnu/COPYING* for more information.

include		System include files.

kerberos5	Kerberos5 (Heimdal) package.

lib		System libraries.

libexec		System daemons.

release		Release building Makefile & associated tools.

rescue		Build system for statically linked /rescue utilities.

sbin		System commands.

secure		Cryptographic libraries and commands.

share		Shared resources.

stand		Boot loader sources.

sys		Kernel sources.

sys/<arch>/conf Kernel configuration files. GENERIC is the configuration
		used in release builds. NOTES contains documentation of
		all possible entries.

tests		Regression tests which can be run by Kyua.  See tests/README
		for additional information.

tools		Utilities for regression testing and miscellaneous tasks.

usr.bin		User commands.

usr.sbin	System administration commands.

For information on synchronizing your source tree with one or more of the FreeBSD Project's development branches, please see:

https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/current-stable.html