[149262] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cryptography Digest, Vol 9, Issue 29

daemon@ATHENA.MIT.EDU (Arnold Reinhold)
Wed Jan 29 16:01:25 2014

X-Original-To: cryptography@metzdowd.com
From: Arnold Reinhold <agr@me.com>
In-reply-to: <mailman.1.1391014801.7843.cryptography@metzdowd.com>
Date: Wed, 29 Jan 2014 15:36:16 -0500
To: cryptography@metzdowd.com
Cc: Thierry Moreau <thierry.moreau@connotech.com>,
	Bill Stewart <bill.stewart@pobox.com>,
	Paul Hoffman <paul.hoffman@vpnc.org>,
	"James A. Donald" <jamesd@echeque.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


--===============6974861104133568339==
Content-type: multipart/alternative;
 boundary="Apple-Mail=_976EAAEF-48B8-4299-97A8-FA38792F3FDC"


--Apple-Mail=_976EAAEF-48B8-4299-97A8-FA38792F3FDC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Yesterday's thread on this topic demonstrates what I have been trying to =
say. Everyone thinks they know how to generate random bits for =
cryptography. Everyone thinks the other guy is doing it wrong and =
everyone is looking at the problem through a different lens and =
therefore missing something important. (And i don't exclude my self.)=20

On Wed, 29 Jan 2014 James A. Donald wrote:
> We do, however, know how to do RNG right. We just don't do it right.
>=20
> Use many, many different entropy sources, even ones that are known to=20=

> suck.  The attacker cannot predict or control all of them.

I agree, find me a standard that says that.

> =85If your device likely has a solid state drive, so no hard drive=20
> turbulence, then it likely has lots of hardware sources of thermal =
noise=20
> and quantum noise, as for example the android phone.


Mobile phones are easy. The hard case is the large number of "internet =
of things" devices being sold or about to be introduced. (Google did not =
pay $3.2 billion for Nest just to conquer the digital thermostat =
business.) Most of these devices lack a hard drive and many have no =
other obvious source of randomness, especial when they first start up. =
Some will be used in places where they can do real damage.

Paul Hoffman wrote:

> ...On all recent FreeBSDs:
>=20
> # dir /dev | grep random
> crw-rw-rw-   1 root  wheel     0x14 Oct  7 07:01 random
> lrwxr-xr-x   1 root  wheel        6 Oct  7 14:00 urandom -> random

As I understand it, FreeBSD currently uses Yarrow for both random an =
urandom. See https://wiki.freebsd.org/201308DevSummit/Security/DevRandom =
for a discussion of possible startup problems.

Thierry Moreau wrote:

> There are no economic incentives for a low-cost manufacturer to commit=20=

> to provide a "trusted" source of entropy. Intel did something and now=20=

> their design is suspected of back-door by (a portion of) the very=20
> community that requested something to be done.

Intel hid their entropy source behind a AES-based whitener, a design =
that is ideal for back-dooring. There is no technical or economic reason =
for doing that and it should be considered as suspicious as Dual_EC_RBG =
was.  If they had a more transparent design, I suspect they would have =
earned broad community support.=20

As for economic incentives, the only one I can think of is to earn a =
certification stamp. FIPS-140 is both overkill and underkill for such =
devices.  We need something better.

>=20
> Somehow this discussion tends to run into circles.

An astute observation. I submit this happens because there is no =
standard or guideline nor a process to get one that has any acceptance.  =
I suggested a Wiki as a start. Any other ideas?

Arnold Reinhold=

--Apple-Mail=_976EAAEF-48B8-4299-97A8-FA38792F3FDC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><div style=3D"margin: 0px; =
font-size: 12px; ">Yesterday's thread on this topic demonstrates what I =
have been trying to say. Everyone thinks they know how to generate =
random bits for cryptography. Everyone thinks the other guy is doing it =
wrong and everyone is looking at the problem through a different lens =
and therefore missing something important. (And i don't exclude my =
self.)&nbsp;</div><div style=3D"margin: 0px; font-size: 12px; =
"><br></div><div style=3D"margin: 0px; font-size: 12px; ">On Wed, 29 Jan =
2014 James A. Donald wrote:</div><div style=3D"margin: 0px; font-size: =
12px; "><blockquote type=3D"cite"><div style=3D"margin: 0px; ">We do, =
however, know how to do RNG right. We just don't do it right.</div><div =
style=3D"margin: 0px; min-height: 14px; "><br></div><div style=3D"margin: =
0px; ">Use many, many different entropy sources, even ones that are =
known to&nbsp;</div><div style=3D"margin: 0px; ">suck. &nbsp;The =
attacker cannot predict or control all of them.</div></blockquote><div =
style=3D"margin: 0px; font-size: 12px; "><br></div><div style=3D"margin: =
0px; ">I agree, find me a standard that says =
that.</div><div><br></div><blockquote type=3D"cite"><div style=3D"margin: =
0px; ">=85If your device likely has a solid state drive, so no hard =
drive&nbsp;</div><div style=3D"margin: 0px; ">turbulence, then it likely =
has lots of hardware sources of thermal noise&nbsp;</div><div =
style=3D"margin: 0px; ">and quantum noise, as for example the android =
phone.</div></blockquote></div><div style=3D"margin: 0px; font-size: =
12px; min-height: 14px; "><br></div><div style=3D"margin: 0px; =
font-size: 12px; ">Mobile phones are easy. The hard case is the large =
number of "internet of things" devices being sold or about to be =
introduced. (Google did not pay $3.2 billion for Nest just to conquer =
the digital thermostat business.) Most of these devices lack a hard =
drive and many have no other obvious source of randomness, especial when =
they first start up. Some will be used in places where they can do real =
damage.</div><div style=3D"margin: 0px; font-size: 12px; min-height: =
14px; "><br></div><div style=3D"margin: 0px; font-size: 12px; ">Paul =
Hoffman wrote:</div><div style=3D"margin: 0px; font-size: 12px; =
min-height: 14px; "><br></div><div style=3D"margin: 0px; font-size: =
12px; "><blockquote type=3D"cite"><div style=3D"margin: 0px; "><span =
style=3D"color: rgb(16, 97, 200); ">...</span>On all recent =
FreeBSDs:</div><div style=3D"margin: 0px; min-height: 14px; =
"><br></div><div style=3D"margin: 0px; "># dir /dev | grep =
random</div><div style=3D"margin: 0px; ">crw-rw-rw- &nbsp;&nbsp;1 root =
&nbsp;wheel &nbsp;&nbsp;&nbsp;&nbsp;0x14 Oct &nbsp;7 07:01 =
random</div><div style=3D"margin: 0px; ">lrwxr-xr-x &nbsp;&nbsp;1 root =
&nbsp;wheel &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;6 Oct &nbsp;7 =
14:00 urandom -&gt; random</div></blockquote><div><div style=3D"margin: =
0px; "><br></div></div></div><div style=3D"margin: 0px; font-size: 12px; =
">As I understand it, FreeBSD currently uses Yarrow for both random an =
urandom. See <a =
href=3D"https://wiki.freebsd.org/201308DevSummit/Security/DevRandom">https=
://wiki.freebsd.org/201308DevSummit/Security/DevRandom</a> for a =
discussion of possible startup problems.</div><div style=3D"margin: 0px; =
font-size: 12px; min-height: 14px; "><br></div><div style=3D"margin: =
0px; font-size: 12px; ">Thierry Moreau wrote:</div><div style=3D"margin: =
0px; font-size: 12px; min-height: 14px; "><br></div><div style=3D"margin: =
0px; font-size: 12px; "><blockquote type=3D"cite"><div style=3D"margin: =
0px; ">There are no economic incentives for a low-cost manufacturer to =
commit&nbsp;</div><div style=3D"margin: 0px; ">to provide a "trusted" =
source of entropy. Intel did something and now&nbsp;</div><div =
style=3D"margin: 0px; ">their design is suspected of back-door by (a =
portion of) the very&nbsp;</div><div style=3D"margin: 0px; ">community =
that requested something to be done.</div></blockquote><div =
style=3D"margin: 0px; font-size: 12px; "><br></div>Intel hid their =
entropy source behind a AES-based whitener, a design that is ideal for =
back-dooring. There is no technical or economic reason for doing that =
and it should be considered as suspicious as Dual_EC_RBG was. &nbsp;If =
they had a more transparent design, I suspect they would have earned =
broad community support.&nbsp;</div><div style=3D"margin: 0px; =
font-size: 12px; "><br></div><div style=3D"margin: 0px; font-size: 12px; =
">As for economic incentives, the only one I can think of is to earn a =
certification stamp. FIPS-140 is both overkill and underkill for such =
devices. &nbsp;We need something better.</div><div style=3D"margin: 0px; =
font-size: 12px; "><br><blockquote type=3D"cite"><div style=3D"margin: =
0px; min-height: 14px; "><br></div><div style=3D"margin: 0px; ">Somehow =
this discussion tends to run into circles.</div></blockquote><div =
style=3D"margin: 0px; font-size: 12px; "><br></div>An astute =
observation. I submit this happens because there is no standard or =
guideline nor a process to get one that has any acceptance. &nbsp;I =
suggested a Wiki as a start. Any other ideas?<div style=3D"margin: 0px; =
"><br></div><div style=3D"margin: 0px; ">Arnold =
Reinhold</div></div></body></html>=

--Apple-Mail=_976EAAEF-48B8-4299-97A8-FA38792F3FDC--

--===============6974861104133568339==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============6974861104133568339==--

home help back first fref pref prev next nref lref last post