From d052e29f0d2944f42667ca464546cd018240f511 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Fri, 6 Dec 2019 05:07:50 +0000 Subject: [PATCH 1/2] Teach `rndctl -L' to update the seed file, not just delete it. The seed file is updated by entering the old seed into the system and then hashing the old seed together with data from /dev/urandom. This way, a crash does not obliterate your persistent entropy. --- sbin/rndctl/Makefile | 12 ++ sbin/rndctl/namespace.h | 1 + sbin/rndctl/rndctl.8 | 10 +- sbin/rndctl/rndctl.c | 247 +++++++++++++++++++++++++++++----------- 4 files changed, 200 insertions(+), 70 deletions(-) create mode 100644 sbin/rndctl/namespace.h diff --git a/sbin/rndctl/Makefile b/sbin/rndctl/Makefile index cd6004c03aba..d4350dd43b1c 100644 --- a/sbin/rndctl/Makefile +++ b/sbin/rndctl/Makefile @@ -5,4 +5,16 @@ MAN= rndctl.8 COPTS.rndctl.c+= ${GCC_NO_STRINGOP_TRUNCATION} +SRCS+= rndctl.c + +# Hack: libc does not export public SHA-3 symbols, so we'll just copy +# them here statically. +.PATH: ${NETBSDSRCDIR}/common/lib/libc/hash/sha3 + +# Hack for namespace.h in sha3.c. +CPPFLAGS+= -I${.CURDIR} + +SRCS+= sha3.c +SRCS+= keccak.c + .include diff --git a/sbin/rndctl/namespace.h b/sbin/rndctl/namespace.h new file mode 100644 index 000000000000..2571d98272a5 --- /dev/null +++ b/sbin/rndctl/namespace.h @@ -0,0 +1 @@ +/* dummy for sha3.c */ diff --git a/sbin/rndctl/rndctl.8 b/sbin/rndctl/rndctl.8 index f2a23e280d97..e5c0c0e5af83 100644 --- a/sbin/rndctl/rndctl.8 +++ b/sbin/rndctl/rndctl.8 @@ -78,9 +78,13 @@ Enable entropy estimation using the collected timing information for the given device name or device type. .It Fl L Load saved entropy from file -.Ar save-file , -which will be overwritten and deleted before the entropy is loaded into -the kernel. +.Ar save-file +and overwrite it with a seed derived by hashing it together with output +from +.Pa /dev/urandom +so that the new seed has at least as much entropy as either the old +seed had or the system already has. +If interrupted, either the old seed or the new seed will be in place. .It Fl l List all sources, or, if the .Fl t diff --git a/sbin/rndctl/rndctl.c b/sbin/rndctl/rndctl.c index b2979d7a19a8..76291fa0a7a0 100644 --- a/sbin/rndctl/rndctl.c +++ b/sbin/rndctl/rndctl.c @@ -41,6 +41,7 @@ __RCSID("$NetBSD: rndctl.c,v 1.30 2015/04/13 22:18:50 riastradh Exp $"); #include #include #include +#include #include #include @@ -127,111 +128,223 @@ find_name(u_int32_t type) } static void -do_save(const char *const filename) +do_save(const char *filename, const void *extra, size_t nextra, + uint32_t extraentropy) { - int est1, est2; - rndpoolstat_t rp; + char tmp[PATH_MAX]; + uint32_t systementropy; + uint8_t buf[32]; + SHAKE128_CTX shake128; rndsave_t rs; SHA1_CTX s; - + ssize_t nread, nwrit; int fd; - fd = open(_PATH_URANDOM, O_RDONLY, 0644); - if (fd < 0) { - err(1, "device open"); - } + /* Paranoia: Avoid stack memory disclosure. */ + memset(&rs, 0, sizeof rs); - if (ioctl(fd, RNDGETPOOLSTAT, &rp) < 0) { - err(1, "ioctl(RNDGETPOOLSTAT)"); - } + /* Format the temporary file name. */ + if (snprintf(tmp, sizeof tmp, "%s.tmp", filename) >= PATH_MAX) + errx(1, "path too long"); - est1 = rp.curentropy; + /* Open /dev/urandom. */ + if ((fd = open(_PATH_URANDOM, O_RDONLY)) == -1) + err(1, "device open"); - if (read(fd, rs.data, sizeof(rs.data)) != sizeof(rs.data)) { - err(1, "entropy read"); - } + /* Find how much entropy is in the pool. */ + if (ioctl(fd, RNDGETENTCNT, &systementropy) == -1) + err(1, "ioctl(RNDGETENTCNT)"); - if (ioctl(fd, RNDGETPOOLSTAT, &rp) < 0) { - err(1, "ioctl(RNDGETPOOLSTAT)"); + /* Read some data from /dev/urandom. */ + if ((size_t)(nread = read(fd, buf, sizeof buf)) != sizeof buf) { + if (nread == -1) + err(1, "read"); + else + errx(1, "truncated read"); } - est2 = rp.curentropy; + /* Close /dev/urandom; we're done with it. */ + if (close(fd) == -1) + warn("close"); + fd = -1; /* paranoia */ - if (est1 - est2 < 0) { - rs.entropy = 0; - } else { - rs.entropy = est1 - est2; - } + /* + * Hash what we read together with the extra input to generate + * the seed data. + */ + SHAKE128_Init(&shake128); + SHAKE128_Update(&shake128, buf, sizeof buf); + SHAKE128_Update(&shake128, extra, nextra); + SHAKE128_Final(rs.data, sizeof(rs.data), &shake128); + explicit_memset(&shake128, 0, sizeof shake128); /* paranoia */ + + /* + * Report an upper bound on the min-entropy of the seed data. + * We take the larger of the system entropy and the extra + * entropy -- the system state and the extra input may or may + * not be independent, so we can't add them -- and clamp to the + * size of the data. + */ + systementropy = MIN(systementropy, + MIN(sizeof(buf), UINT32_MAX/NBBY)*NBBY); + extraentropy = MIN(extraentropy, MIN(nextra, UINT32_MAX/NBBY)*NBBY); + rs.entropy = MIN(MAX(systementropy, extraentropy), + MIN(sizeof(rs.data), UINT32_MAX/NBBY)*NBBY); + /* + * Compute the checksum on the 32-bit entropy count, in host + * byte order (XXX this means it is not portable across + * different-endian platforms!), followed by the seed data. + */ SHA1Init(&s); - SHA1Update(&s, (uint8_t *)&rs.entropy, sizeof(rs.entropy)); + SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); SHA1Update(&s, rs.data, sizeof(rs.data)); SHA1Final(rs.digest, &s); + explicit_memset(&s, 0, sizeof s); /* paranoia */ - close(fd); - unlink(filename); - fd = open(filename, O_CREAT|O_EXCL|O_WRONLY, 0600); - if (fd < 0) { - err(1, "output open"); + /* + * Write it to a temporary file and sync it before we commit. + * This way either the old seed or the new seed is completely + * written in the expected location on disk even if the system + * crashes as long as the file system doesn't get corrupted too + * badly. + * + * If interrupted after this point and the temporary file is + * disclosed, no big deal -- either the pool was predictable to + * begin with in which case we're hosed either way, or we've + * just revealed some output which is not a problem. + */ + if ((fd = open(tmp, O_CREAT|O_TRUNC|O_WRONLY, 0600)) == -1) + err(1, "open seed file to save"); + if ((size_t)(nwrit = write(fd, &rs, sizeof rs)) != sizeof rs) { + int error = errno; + if (unlink(tmp) == -1) + warn("unlink"); + if (nwrit == -1) + errc(1, error, "write"); + else + errx(1, "truncated write"); } - - if (write(fd, &rs, sizeof(rs)) != sizeof(rs)) { - unlink(filename); - fsync_range(fd, FDATASYNC|FDISKSYNC, (off_t)0, (off_t)0); - err(1, "write"); + explicit_memset(&rs, 0, sizeof rs); /* paranoia */ + if (fsync_range(fd, FDATASYNC|FDISKSYNC, 0, 0) == -1) { + int error = errno; + if (unlink(tmp) == -1) + warn("unlink"); + errc(1, error, "fsync_range"); } - fsync_range(fd, FDATASYNC|FDISKSYNC, (off_t)0, (off_t)0); - close(fd); + if (close(fd) == -1) + warn("close"); + + /* Rename it over the original file to commit. */ + if (rename(tmp, filename) == -1) + err(1, "rename"); } static void -do_load(const char *const filename) +do_load(const char *filename) { - int fd; - rndsave_t rs, rszero; + char tmp[PATH_MAX]; + int fd_seed, fd_random; + static const rndsave_t rszero; + rndsave_t rs; rnddata_t rd; + ssize_t nread, nwrit; SHA1_CTX s; uint8_t digest[SHA1_DIGEST_LENGTH]; - fd = open(filename, O_RDWR, 0600); - if (fd < 0) { - err(1, "input open"); - } - - unlink(filename); + /* + * The order of operations is important here: + * + * 1. Load the old seed. + * 2. Feed the old seed into the kernel. + * 3. Generate and write a new seed. + * 4. Erase the old seed. + * + * This follows the procedure in + * + * Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno, + * _Cryptography Engineering_, Wiley, 2010, Sec. 9.6.2 + * `Update Seed File'. + * + * There is a race condition: If another process generates a + * key from /dev/urandom after step (2) but before step (3), + * and if the machine crashes before step (3), an adversary who + * can read the disk after the crash can probably guess the + * complete state of the entropy pool and thereby predict the + * key. + * + * There's not much we can do here without some kind of + * systemwide lock on /dev/urandom and without introducing an + * opportunity for a crash to wipe out the entropy altogether. + * To avoid this race, you should ensure that any key + * generation happens _after_ `rndctl -L' has completed. + */ - if (read(fd, &rs, sizeof(rs)) != sizeof(rs)) { - err(1, "read"); + /* Format the temporary file name. */ + if (snprintf(tmp, sizeof tmp, "%s.tmp", filename) >= PATH_MAX) + errx(1, "path too long"); + + /* 1. Load the old seed. */ + if ((fd_seed = open(filename, O_RDWR)) == -1) + err(1, "open seed file to load"); + if ((size_t)(nread = read(fd_seed, &rs, sizeof rs)) != sizeof rs) { + if (nread == -1) + err(1, "read seed"); + else + errx(1, "seed too short"); } - memset(&rszero, 0, sizeof(rszero)); - if (pwrite(fd, &rszero, sizeof(rszero), (off_t)0) != sizeof(rszero)) - err(1, "overwrite"); - fsync_range(fd, FDATASYNC|FDISKSYNC, (off_t)0, (off_t)0); - close(fd); - + /* Verify its checksum. */ SHA1Init(&s); - SHA1Update(&s, (uint8_t *)&rs.entropy, sizeof(rs.entropy)); + SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); SHA1Update(&s, rs.data, sizeof(rs.data)); SHA1Final(digest, &s); - - if (memcmp(digest, rs.digest, sizeof(digest))) { - errx(1, "bad digest"); + if (!consttime_memequal(digest, rs.digest, sizeof(digest))) { + /* + * If the checksum doesn't match, doesn't hurt to feed + * the seed in anyway, but act as though it has zero + * entropy in case it was corrupted with predictable + * garbage. + */ + warnx("bad checksum"); + rs.entropy = 0; } + /* Format the ioctl request. */ rd.len = MIN(sizeof(rd.data), sizeof(rs.data)); rd.entropy = rs.entropy; - memcpy(rd.data, rs.data, MIN(sizeof(rd.data), sizeof(rs.data))); + memcpy(rd.data, rs.data, rd.len); + explicit_memset(&rs, 0, sizeof rs); /* paranoia */ + + /* 2. Feed the old seed into the kernel. */ + if ((fd_random = open(_PATH_URANDOM, O_WRONLY)) == -1) + err(1, "open /dev/urandom"); + if (ioctl(fd_random, RNDADDDATA, &rd) == -1) + err(1, "RNDADDDATA"); + if (close(fd_random) == -1) + warn("close /dev/urandom"); + fd_random = -1; /* paranoia */ - fd = open(_PATH_URANDOM, O_RDWR, 0644); - if (fd < 0) { - err(1, "device open"); - } + /* + * 3. Generate and write a new seed. Note that we hash the old + * seed together with whatever /dev/urandom returns in do_save. + * Why? After RNDADDDATA, the input may not be distributed + * immediately to /dev/urandom. + */ + do_save(filename, rd.data, rd.len, rd.entropy); + explicit_memset(&rd, 0, sizeof rd); /* paranoia */ - if (ioctl(fd, RNDADDDATA, &rd) < 0) { - err(1, "ioctl"); - } - close(fd); + /* + * 4. Erase the old seed. Only effective if we're on a + * fixed-address file system like ffs -- doesn't help to erase + * the data on lfs, but doesn't hurt either. No need to unlink + * because do_save will have already overwritten it. + */ + if ((size_t)(nwrit = pwrite(fd_seed, &rszero, sizeof rszero, 0)) + != sizeof rszero) + err(1, "overwrite old seed"); + if (fsync_range(fd_seed, FDATASYNC|FDISKSYNC, 0, 0) == -1) + err(1, "fsync_range"); } static void @@ -482,7 +595,7 @@ main(int argc, char **argv) * Save. */ if (cmd == 'S') { - do_save(filename); + do_save(filename, NULL, 0, 0); exit(0); } From fd92d42c04fc0b36e3105ef9a74867f747f7c325 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Fri, 6 Dec 2019 05:15:29 +0000 Subject: [PATCH 2/2] Save the entropy seed daily in /etc/security. --- etc/defaults/security.conf | 2 ++ etc/security | 7 +++++++ share/man/man5/security.conf.5 | 11 +++++++++++ 3 files changed, 20 insertions(+) diff --git a/etc/defaults/security.conf b/etc/defaults/security.conf index 18ab2506c1cd..e574cb30e455 100644 --- a/etc/defaults/security.conf +++ b/etc/defaults/security.conf @@ -46,3 +46,5 @@ check_passwd_permit_star=NO check_passwd_permit_nonalpha=NO max_loginlen=16 max_grouplen=16 + +random_file=/var/db/entropy-file diff --git a/etc/security b/etc/security index 75331fd4078c..85133b79b8cf 100644 --- a/etc/security +++ b/etc/security @@ -1049,6 +1049,13 @@ if checkyesno check_changelist ; then CHANGELIST="$CHANGEFILES $CHANGELIST" fi +# Save entropy to ${random_file} if defined, like +# /etc/rc.d/random_seed. +# +if [ -n "${random_file:-}" ]; then + rndctl -S "$random_file" +fi + # Special case backups, including the master password file and # ssh private host keys. The normal backup mechanisms for # $check_changelist (see below) also print out the actual file diff --git a/share/man/man5/security.conf.5 b/share/man/man5/security.conf.5 index 6d0da8ab01d2..d19349128a6c 100644 --- a/share/man/man5/security.conf.5 +++ b/share/man/man5/security.conf.5 @@ -282,6 +282,17 @@ for maintaining backup copies of files noted in and .Sy check_changelist instead of just keeping a current copy and a backup copy. +.It Sy random_file +Name of the entropy seed file used at boot. +Default is +.Pa /var/db/entropy-file +as used by +.Pa /etc/rc.d/random_seed . +Set +.Sy random_file +to empty to disable saving a seed every time +.Pa /etc/security +runs. .El .Sh FILES .Bl -tag -width /etc/defaults/security.conf -compact