Hacker News new | past | comments | ask | show | jobs | submit login
Why secure systems require random numbers (cloudflare.com)
83 points by jgrahamc on Sept 13, 2013 | hide | past | favorite | 26 comments



FWIW: I don't like OpenSSL as a CSPRNG; I think you'd generally better off replacing it with direct reads from urandom.

Another useful thing to know: there is lately a push towards crypto constructions that minimize dependencies on randomness. For example, there's "deterministic" DSA that replaces the nonce with a uncorrelated (psuedorandom) bits from digest functions. If you see people talking about cryptosystems being bad or good based on CSPRNG dependencies, that's the idea they're talking about.

This was a good post. For the record, we've been repeatedly trying and failing to hire Daniel Franke ever since that HN hack.


I don't like OpenSSL as a CSPRNG

What's not to like about it?! The potential for multiple processes to share PRNG state after fork()s (unless the processes explicitly reseed)? The tri-state return value from the RAND_bytes() function (success, failure, more failure)?


Extrapolating a little when you say you don't like openssl as a CSPRNG, do you mean you don't like any of the CSPRNGs or just the openssl one? For e.g. NIST specified some CSPRNGs in the DSA specification.

You don't like them because the application might end believing it has more entropy than it really has or are there other reasons?


I don't like the OpenSSL CSPRNG in particular for the same reasons 'rwg cited. But more broadly, I don't like app-layer CPSRNGs. CSPRNGs are one thing that benefits from being centralized on the OS.


It's been linked often, but allow me to re-recommend the Matasano Crypto Challenge for learning more. It has a section on pseudo-random number generation. http://tinyurl.com/mtsocrypt


There are a bunch of cheap, well supported, hardware random number generators out there. For example, the Entropy Key: http://www.entropykey.co.uk/


"Please note that there is a very long waiting period for Entropy Keys at the moment."

That notice has been there for a very long time, not sure what this period is...

(maybe they have run out of randomness!)


Two reasons why crypto needs randomness:

1) You need to generate keys that nobody can guess.

2) Much of modern crypto is built based on probabilistic encryption [1].

[1] http://theory.lcs.mit.edu/~cis/pubs/shafi/1984-jcss.pdf


Notably newer Intel CPUs (iirc, Sandybridge and later) include a true random number generator, but I'm not sure how much software supports it yet.


It's mixed into the Linux random number generator if available: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.g...


Which people fear is backdoored by the NSA.


No, people don't directly fear it's backdoored by the NSA. There has never been any evidence that it's backdoored by the NSA. The algorithm it's documented as using (based on AES) is not the one that was backdoored by the NSA (Dual_EC_DRBG), though you would have to take a look at the chip with a scanning electron microscope in order to verify this.

The kernel developers just don't think it's a good idea to blindly trust unauditable hardware random number generators. Using it in conjunction with other sources of entropy is one thing; just using it on its own is putting a bit too much faith in it, especially because the code that uses it uses a generic wrapper for any hardware random number generation instruction, so if AMD or ARM or MIPS chips later come with random number generators, the kernel will be able to take advantage of their entropy without putting itself at risk if one of them is backdoored.

There's a difference between fearing that something is backdoored, and thinking that it's not a good policy not to blindly trust something.


Not sure if I'm reading the code correctly, but it seems like it mixes the hardware random bits with the output of what would be generated otherwise. I.e., Linux does not add the the RDRAND output to the entropy pool.

This means it might take more time to generate the required number of random bits. So not trusting RDRAND means a process might block waiting for random data.

Then again, hardware generators may be affected by external forces - other than the NSA. For example, CPU temperature.


Yes, that's right, the kernel doesn't add it to the entropy pool. RDRAND is a cryptographically secure pseudo-random number generator, it doesn't give you direct access to the full entropy of the hardware random number generator (that is planned with the RDSEED instruction, which isn't shipping yet[1]). RDRAND re-seeds a CSPRNG periodically with its hardware RNG, but it's not appropriate to feed directly in as the seed of another CSPRNG like Linux's /dev/random. Intel does provide a suggestion for how to ensure that it gets reseeded, so you can ensure you have seed-grade entropy in their software implementation guide[2]; it involves either calling it 1022 times, or running it 32 times with a 10 μs wait per iteration.

In Linux, there's a user-space deamon, rngd, that's responsible for mixing hardware random number generator entropy into the entropy pool. That's a more appropriate place to put the logic for adding entropy from RDRAND into the entropy pool; you probably don't want to be doing those 1022 iterations or 32 iterations with a sleep in between in the kernel itself.

The kernel just uses it as a parallel CSPRNG along with its own built in one. It runs its own, and RDRAND, and xors the results together. This allows it to get fast, good random numbers (which are important early in the boot sequence, for things like ASLR) even if its own entropy pool does not have very good entropy yet. This makes its random number generation at least as good as the stronger of RDRAND and the kernel's own CSPRNG. It does mean that if RDRAND (or some other processor's similar instruction, once other processors add it; it would be quite valuable on ARM and MIPS as embedded machines tend not to have very good entropy sources) is backdoored, and the kernel entropy pool has insufficient entropy, it may be possible for someone with knowledge of the backdoor to crack it, with a difficulty equal to the amount of entropy that the Linux entropy pool has. However, this is only true if you are using the non-blocking random number source, which tends to be used by things that need fast random numbers but don't need particularly good seed-grade entropy, like ASLR. If you need high-quality entropy, just use /dev/random and it will block until you have enough entropy to satisfy your request.

[1]: http://software.intel.com/en-us/blogs/2012/11/17/the-differe... [2]: http://software.intel.com/en-us/articles/intel-digital-rando...



When I was buying a new laptop a few months ago, I was specifically looking for one that had a TPM built-in as those also include an RNG. Recent versions of rng-tools can make use of this RNG to (non-exclusively) seed /dev/random.

On a related note, I noticed recently that the BCM2835 SoC in my Raspberry Pi has an RNG as well. I've been considering using it (off-line) to generate private keys for SSL certificates issued by our private CA.


This comment in Linux's bcm2835-rng.c driver makes me wonder about the RNG:

    /* the initial numbers generated are "less random" so will be discarded */
    #define RNG_WARMUP_COUNT 0x40000
How was this magic value derived? Why are the initial (quarter million?) values "less random"? Where's a datasheet that describes this thing's operation?


Perhaps they're produced before the system has had a chance to gather much entropy?


I feel there is some relevance to the images in the article that I don't understand..


Yes, that first disney image left me confused and slightly uncomfortable! Hovering over it give an indication though, the tooltip says "so random!".

Of course the other images mostly make sense, but it would have been informative to have captions on some of them, such as the the second image, which has alt-text of "the three".


Read the other comments that have been posted here. =)


who are the other two in the photo? http://blog.cloudflare.com/static/images/vonneumann.jpg

(von neumann is on the left, i think?)


Feynman and Ulam.

I liked that photo because there's von Neumann who I referenced, Ulam because of the Monte Carlo method (https://en.wikipedia.org/wiki/Stanislaw_Ulam#Monte_Carlo_met...) and Feynman because, well, Feynman's cool.


Stanislaw Ulam and Richard Feynman.

EDIT: I knew Feynman. I did a Google image search which suggested Ulam, and also linked to here which has the image and a caption. (http://www.lanl.gov/science/1663/december2009/)


Why not use a quantum random number generator? It is truly random, and ones based on photon path output bits.


<meta> I didn't expect such a bright topcolor!




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: