lib/random32.c security
From: George Spelvin
Date: Wed Apr 01 2020 - 01:23:03 EST
On Sun, Mar 29, 2020 at 05:42:14PM -0400, Theodore Y. Ts'o wrote:
> If anyone is trying to rely on prandom_u32() as being "strong" in any
> sense of the word in terms of being reversable by attacker --- they
> shouldn't be using prandom_u32(). That's going to be true no matter
> *what* algorithm we use.
>
> Better distribution? Sure. Making prandom_u32() faster? Absolutely;
> that's its primary Raison d'Etre.
I'd like your comments on an idea I had to add a second PRNG state
for security-interesting applications.
There are some ASLR tasks, notably slab freelist shuffling and
per-syscall stack offset randomization, which need a Very Fast
source of random numbers. No crypto-grade generator qualifies,
and both currently use very bad ad-hoc generators.
The per-syscall stack offset code currently uses the lsbits of the
TSC, which is obviously bad as they're observable by the (presumed
malicious) userspace immediately before the call and thus highly
predictable.
Likewise, the slab shuffling currently precomputes a permutation and
just picks a random starting position for every slab.
Both are saved by the fact that their PRNG outputs are mostly
unobservable, so an attacker can't start to predict them.
I was thinking that a second PRNG, identical to the prandom_u32()
one but seeded speartely, could be used for this purpose. The good
distribution would preclude trivial patterns in their output, which
is about all we can hope for.
The difference is that it would only be used for applications which
both require high speed and are (mostly) unobservable to an attacker.
Any opinions, anyone?