[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20181012144352.GE2420@thunk.org>
Date: Fri, 12 Oct 2018 10:43:52 -0400
From: "Theodore Y. Ts'o" <tytso@....edu>
To: Arnd Bergmann <arnd@...db.de>
Cc: Kees Cook <keescook@...omium.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Laura Abbott <labbott@...hat.com>,
Daniel Micay <danielmicay@...il.com>,
Ard Biesheuvel <ard.biesheuvel@...aro.org>,
tcharding <me@...in.cc>, "Jason A. Donenfeld" <Jason@...c4.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Ingo Molnar <mingo@...nel.org>,
Steven Rostedt <rostedt@...dmis.org>,
Thomas Gleixner <tglx@...utronix.de>,
Alexandre Belloni <alexandre.belloni@...tlin.com>,
linux-rtc@...r.kernel.org
Subject: Re: [PATCH] random: Move rand_initialize() earlier
On Fri, Oct 12, 2018 at 10:42:39AM +0200, Arnd Bergmann wrote:
> I wonder if mixing in ktime_get_real() is flawed to start with:
> This depends on read_persistent_clock64() actually returning
> a meaningful time, but in many cases it does not; x86 being
> a notable exception.
>
> We have three ways of setting the initial time:
>
> * At early boot using read_persistent_clock64(). This may read
> the time from the hypervisor (if any), and on some older
> architectures that have a custom RTC abstraction, it
> reads from the RTC directly. We generally move away from
> the RTC method in favor of the proper rtc class interfaces
> (see below)
>
> * At late_initcall time, in rtc_hctosys(). If an RTC driver has
> been loaded successfully at this time, it will be read from
> there. We also move away from this.
>
> * From user space, which reads the RTC time or NTP,
> and then sets the system time from that.
>
> The latter two end up in do_settimeofday64(), but there
> is no mixing in of the time into the random seed that I can
> see, and it's not clear whether there should be (it
> can be called with arbitrary times from user space,
> provided CAP_SYS_TIME permissions).
I think it adds some real value (although perhaps small) in the first
two cases. In all of the cases, though, since we don't add any
entropy credit, it doesn't hurt to mix it in --- this is the same
argument why it's fine that /dev/[u]random can be world-writeable.
Mixing in user-controlled data is harmless, and if it's not visible to
a remote attacker, it can be helpful.
- Ted
Powered by blists - more mailing lists