Re: [dsfjdssdfsd] Risks of entropy available

Theodore Ts'o <tytso@mit.edu> Thu, 11 January 2018 22:49 UTC

Return-Path: <tytso@thunk.org>
X-Original-To: dsfjdssdfsd@ietfa.amsl.com
Delivered-To: dsfjdssdfsd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16CF4127333 for <dsfjdssdfsd@ietfa.amsl.com>; Thu, 11 Jan 2018 14:49:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.661
X-Spam-Level:
X-Spam-Status: No, score=-1.661 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=thunk.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xnjcrs4aSc5T for <dsfjdssdfsd@ietfa.amsl.com>; Thu, 11 Jan 2018 14:49:56 -0800 (PST)
Received: from imap.thunk.org (imap.thunk.org [IPv6:2600:3c02::f03c:91ff:fe96:be03]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAECB12D848 for <dsfjdssdfsd@ietf.org>; Thu, 11 Jan 2018 14:49:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=thunk.org; s=ef5046eb; h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID: Subject:Cc:To:From:Date:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=S6Vs0L9aj1J4E4VEQIFYMpBXd4G/UQztb12wEB5gLg4=; b=Ghx9N/gn6ERbfjEp6kOwx0mIOV LmfgVL6mUGcbmGSAC+FlXLCFub968FlcRjgUiVkIIyWSngtL+VKvEY6xBaMRqpvXgzHG8XrXm2v5v URoBw3QFacJtHHqNvNpYrzAon5ILMPr4TlUCZ5qHh/mxqwp5ROWn+5qyiVDjqOdgzAVo=;
Received: from root (helo=callcc.thunk.org) by imap.thunk.org with local-esmtp (Exim 4.89) (envelope-from <tytso@thunk.org>) id 1eZlfW-0006i7-V2; Thu, 11 Jan 2018 22:49:55 +0000
Received: by callcc.thunk.org (Postfix, from userid 15806) id D4DB9C001F1; Thu, 11 Jan 2018 17:49:53 -0500 (EST)
Date: Thu, 11 Jan 2018 17:49:53 -0500
From: Theodore Ts'o <tytso@mit.edu>
To: Dan Brown <danibrown@blackberry.com>
Cc: "dsfjdssdfsd@ietf.org" <dsfjdssdfsd@ietf.org>
Message-ID: <20180111224953.GL19241@thunk.org>
References: <810C31990B57ED40B2062BA10D43FBF501083C12@XMB116CNC.rim.net> <810C31990B57ED40B2062BA10D43FBF501C15EDD@XMB116CNC.rim.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <810C31990B57ED40B2062BA10D43FBF501C15EDD@XMB116CNC.rim.net>
User-Agent: Mutt/1.9.2 (2017-12-15)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: tytso@thunk.org
X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/dsfjdssdfsd/BsCH0FavtE3HbjTHk9GNZgMnrr4>
Subject: Re: [dsfjdssdfsd] Risks of entropy available
X-BeenThere: dsfjdssdfsd@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols, for example related to updating RFC 4086." <dsfjdssdfsd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dsfjdssdfsd/>
List-Post: <mailto:dsfjdssdfsd@ietf.org>
List-Help: <mailto:dsfjdssdfsd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jan 2018 22:49:58 -0000

On Thu, Jan 11, 2018 at 08:19:30PM +0000, Dan Brown wrote:
> 
> If an adversary gains access to this interface, then there is a
> small risk that sensitive information leaks to the adversary,
> because the entropy estimate may be derived from and correlated to
> sensitive information.

I'll note that most of the entropy is coming from interrupt timing,
and we use timing from many interrupts for a single bit.  One can get
more information about what is going on with the system using
/proc/interrupts.  You'll get far more detail about keyboard timings
from /proc/interrupts.

You can also find out what's happening with incoming network packets
using ifconfig.... and then there's vmstat, iostat, ps, etc., etc.

So there's quite a lot of system interfaces one would have to restrict
before I would even *start* worrying about the entropy count.

Regards,

						- Ted