glibc/sysdeps
Jason A. Donenfeld eaad4f9e8f arc4random: simplify design for better safety
Rather than buffering 16 MiB of entropy in userspace (by way of
chacha20), simply call getrandom() every time.

This approach is doubtlessly slower, for now, but trying to prematurely
optimize arc4random appears to be leading toward all sorts of nasty
properties and gotchas. Instead, this patch takes a much more
conservative approach. The interface is added as a basic loop wrapper
around getrandom(), and then later, the kernel and libc together can
work together on optimizing that.

This prevents numerous issues in which userspace is unaware of when it
really must throw away its buffer, since we avoid buffering all
together. Future improvements may include userspace learning more from
the kernel about when to do that, which might make these sorts of
chacha20-based optimizations more possible. The current heuristic of 16
MiB is meaningless garbage that doesn't correspond to anything the
kernel might know about. So for now, let's just do something
conservative that we know is correct and won't lead to cryptographic
issues for users of this function.

This patch might be considered along the lines of, "optimization is the
root of all evil," in that the much more complex implementation it
replaces moves too fast without considering security implications,
whereas the incremental approach done here is a much safer way of going
about things. Once this lands, we can take our time in optimizing this
properly using new interplay between the kernel and userspace.

getrandom(0) is used, since that's the one that ensures the bytes
returned are cryptographically secure. But on systems without it, we
fallback to using /dev/urandom. This is unfortunate because it means
opening a file descriptor, but there's not much of a choice. Secondly,
as part of the fallback, in order to get more or less the same
properties of getrandom(0), we poll on /dev/random, and if the poll
succeeds at least once, then we assume the RNG is initialized. This is a
rough approximation, as the ancient "non-blocking pool" initialized
after the "blocking pool", not before, and it may not port back to all
ancient kernels, though it does to all kernels supported by glibc
(≥3.2), so generally it's the best approximation we can do.

The motivation for including arc4random, in the first place, is to have
source-level compatibility with existing code. That means this patch
doesn't attempt to litigate the interface itself. It does, however,
choose a conservative approach for implementing it.

Cc: Adhemerval Zanella Netto <adhemerval.zanella@linaro.org>
Cc: Florian Weimer <fweimer@redhat.com>
Cc: Cristian Rodríguez <crrodriguez@opensuse.org>
Cc: Paul Eggert <eggert@cs.ucla.edu>
Cc: Mark Harris <mark.hsj@gmail.com>
Cc: Eric Biggers <ebiggers@kernel.org>
Cc: linux-crypto@vger.kernel.org
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>

Reviewed-by: Adhemerval Zanella  <adhemerval.zanella@linaro.org>
2022-07-27 08:58:27 -03:00
..
aarch64 arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
alpha alpha: Remove _dl_skip_args usage 2022-05-30 16:32:22 -03:00
arc elf: Remove ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA 2022-06-15 11:29:55 -07:00
arm Add bounds check to __libc_ifunc_impl_list 2022-06-10 17:13:29 +01:00
csky csky: Remove _dl_skip_args usage 2022-05-30 16:32:33 -03:00
generic arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
gnu Update copyright dates with scripts/update-copyrights 2022-01-01 11:40:24 -08:00
hppa hppa: Remove _dl_skip_args usage (BZ# 29165) 2022-05-30 16:32:35 -03:00
htl htl: Fix initializing the key lock 2022-02-14 19:29:02 +01:00
hurd hurd: Fix pthread_kill on exiting/ted thread 2022-01-15 15:11:54 +01:00
i386 i386: Remove -Wa,-mtune=i686 2022-07-12 11:14:32 -07:00
ia64 grep: egrep -> grep -E, fgrep -> grep -F 2022-06-05 12:09:02 -07:00
ieee754 i686: Use generic sincosf implementation for SSE2 version 2022-06-01 10:47:44 -03:00
loongarch LoongArch: Hard Float Support 2022-07-26 12:35:12 -03:00
m68k m68k: optimize RTLD_START 2022-06-25 00:22:02 +02:00
mach arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
microblaze microblaze: Remove _dl_skip_args usage 2022-05-30 16:33:14 -03:00
mips mips: Remove _dl_skip_args usage 2022-05-30 16:33:16 -03:00
nios2 Remove remnant reference to ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA 2022-06-15 13:02:17 -07:00
nptl arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
or1k elf: Replace PI_STATIC_AND_HIDDEN with opposite HIDDEN_VAR_NEEDS_DYNAMIC_RELOC 2022-04-26 09:26:22 -07:00
posix Refactor internal-signals.h 2022-06-30 14:56:21 -03:00
powerpc arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
pthread nptl: Fix __libc_cleanup_pop_restore asynchronous restore (BZ#29214) 2022-06-08 09:23:02 -03:00
riscv riscv: Use memcpy to handle unaligned access when fixing R_RISCV_RELATIVE 2022-06-30 08:04:52 -07:00
s390 arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
sh sh: Remove _dl_skip_args usage 2022-05-30 16:33:28 -03:00
sparc Add bounds check to __libc_ifunc_impl_list 2022-06-10 17:13:29 +01:00
unix arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00
wordsize-32 Update copyright dates with scripts/update-copyrights 2022-01-01 11:40:24 -08:00
wordsize-64 Update copyright dates with scripts/update-copyrights 2022-01-01 11:40:24 -08:00
x86 x86: Add support to build strcmp/strlen/strchr with explicit ISA level 2022-07-16 03:07:59 -07:00
x86_64 arc4random: simplify design for better safety 2022-07-27 08:58:27 -03:00