Английская Википедия:/dev/random

Материал из Онлайн справочника
Перейти к навигацииПерейти к поиску

Файл:Hexdump of dev urandom.png
256 byte hex dump of /dev/urandom

Шаблон:Short description

In Unix-like operating systems, Шаблон:Mono and Шаблон:Mono are special files that serve as cryptographically secure pseudorandom number generators. They allow access to a cryptographically secure pseudorandom number generator that is seeded with entropy from environmental noise, collected from device drivers and other sources.[1] Шаблон:Mono typically blocks if there was less entropy available than requested; more recently (see below for the differences between operating systems). It usually blocks at startup until sufficient entropy has been gathered, then unblocks permanently. The Шаблон:Mono device typically was never a blocking device, even if the pseudorandom number generator seed was not fully initialized with entropy since boot. Not all operating systems implement the same methods for Шаблон:Mono and Шаблон:Mono.

Linux

Файл:Rngtest FIPS-140-2 screenshot.png
Rngtest testing /dev/random pool

Random number generation in kernel space was implemented for the first time for Linux[2] in 1994 by Theodore Ts'o.[3] The implementation used secure hashes rather than ciphers,Шаблон:Clarify to avoid cryptography export restrictions that were in place when the generator was originally designed. The implementation was also designed with the assumption that any given hash or cipher might eventually be found to be weak, and so the design is durable in the face of any such weaknesses. Fast recovery from pool compromise is not considered a requirement, because the requirements for pool compromise are sufficient for much easier and more direct attacks on unrelated parts of the operating system.

In Ts'o's implementation, the generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. When read, the Шаблон:Mono device will only return random bytes within the estimated number of bits of noise in the entropy pool. When the entropy pool is empty, reads from Шаблон:Mono will block until additional environmental noise is gathered.[4] The intent is to serve as a cryptographically secure pseudorandom number generator, delivering output with entropy as large as possible. This is suggested by the authors for use in generating cryptographic keys for high-value or long-term protection.[4]

A counterpart to Шаблон:Mono is Шаблон:Mono ("unlimited"[5]/non-blocking random source[4]) which reuses the internal pool to produce more pseudo-random bits. This means that the call will not block, but the output may contain less entropy than the corresponding read from Шаблон:Mono. While Шаблон:Mono is still intended as a pseudorandom number generator suitable for most cryptographic purposes, the authors of the corresponding man page note that, theoretically, there may exist an as-yet-unpublished attack on the algorithm used by Шаблон:Mono, and that users concerned about such an attack should use Шаблон:Mono instead.[4] However such an attack is unlikely to come into existence, because once the entropy pool is unpredictable it doesn't leak security by a reduced number of bits.[6]

It is also possible to write to Шаблон:Mono. This allows any user to mix random data into the pool. Non-random data is harmless, because only a privileged user can issue the ioctl needed to increase the entropy estimate.Шаблон:Dubious The current amount of entropy and the size of the Linux kernel entropy pool, both measured in bits, are available in Шаблон:Mono and can be displayed by the command Шаблон:Code and Шаблон:Code respectively.

Gutterman, Pinkas, & Reinman in March 2006 published a detailed cryptographic analysis of the Linux random number generator[7] in which they describe several weaknesses. Perhaps the most severe issue they report is with embedded or Live CD systems, such as routers and diskless clients, for which the bootup state is predictable and the available supply of entropy from the environment may be limited. For a system with non-volatile memory, they recommend saving some state from the RNG at shutdown so that it can be included in the RNG state on the next reboot. In the case of a router for which network traffic represents the primary available source of entropy, they note that saving state across reboots "would require potential attackers to either eavesdrop on all network traffic" from when the router is first put into service, or obtain direct access to the router's internal state. This issue, they note, is particularly critical in the case of a wireless router whose network traffic can be captured from a distance, and which may be using the RNG to generate keys for data encryption.

The Linux kernel provides support for several hardware random number generators, should they be installed. The raw output of such a device may be obtained from Шаблон:Mono.[8]

With Linux kernel 3.16 and newer,[9] the kernel itself mixes data from hardware random number generators into Шаблон:Mono on a sliding scale based on the definable entropy estimation quality of the HWRNG. This means that no userspace daemon, such as Шаблон:Mono from Шаблон:Mono, is needed to do that job. With Linux kernel 3.17+, the VirtIO RNG was modified to have a default quality defined above 0,[10] and as such, is currently the only HWRNG mixed into Шаблон:Mono by default.

The entropy pool can be improved by programs like Шаблон:Mono, Шаблон:Mono, Шаблон:Mono etc. With Шаблон:Mono, hardware random number generators like Entropy Key, etc. can write to Шаблон:Mono. The diehard tests programs Шаблон:Mono, Шаблон:Mono and Шаблон:Mono can test these random number generators.[11][12][13][14]

In January 2014, Daniel J. Bernstein published a critique[15] of how Linux mixes different sources of entropy. He outlines an attack in which one source of entropy capable of monitoring the other sources of entropy could modify its output to nullify the randomness of the other sources of entropy. Consider the function Шаблон:Tmath where H is a hash function and x, y, and z are sources of entropy with z being the output of a CPU based malicious HRNG Z:

  1. Z generates a random value of r.
  2. Z computes Шаблон:Tmath.
  3. If the output of Шаблон:Tmath is equal to the desired value, output r as z.
  4. Else, repeat starting at 1.

Bernstein estimated that an attacker would need to repeat Шаблон:Tmath 16 times to compromise DSA and ECDSA. This is possible because Linux reseeds H on an ongoing basis instead of using a single high quality seed.

In October 2016, with the release of Linux kernel version 4.8, the kernel's Шаблон:Mono was switched over to a ChaCha20-based cryptographic pseudorandom number generator (CPRNG) implementation[16] by Theodore Ts'o, based on Bernstein's well-regarded stream cipher ChaCha20.

Since version 5.6 of the Linux kernel Шаблон:Mono only blocks when the CPRNG hasn't initialized. Once initialized, Шаблон:Mono and Шаблон:Mono behave the same.[17]

Since version 5.17 of the Linux kernel, the random number generator switched from using the SHA-1 cryptographic hash function in the entropy collector to BLAKE2s, a newer, faster and more secure hash function.[18]

BSD systems

The FreeBSD operating system provides a Шаблон:Mono link to Шаблон:Mono. Both block only until properly seeded. FreeBSD's PRNG (Fortuna) reseeds regularly, and does not attempt to estimate entropy. On a system with small amount of network and disk activity, reseeding is done after a fraction of a second.

Since OpenBSD 5.1 (May 1, 2012) Шаблон:Mono and Шаблон:Mono used an algorithm based on RC4 but renamed to ARC4 because of intellectual property reasons. While random number generation here uses system entropy gathered in several ways, the ARC4 algorithm provides a fail-safe, ensuring that a rapid and high quality pseudo-random number stream is provided even when the pool is in a low entropy state. The system automatically uses hardware random number generators (such as those provided on some Intel PCI hubs) if they are available, through the OpenBSD Cryptographic Framework. As of OpenBSD 5.5 (May 1, 2014), the Шаблон:Code call used for OpenBSD's random devices no longer uses ARC4, but ChaCha20 (arc4random name might be reconsidered as A Replacement Call for Random).[19][20] Шаблон:Mono was removed in OpenBSD 6.3 (April 15, 2018).[21]

NetBSD's implementation of the legacy Шаблон:Code API has been switched over to ChaCha20 as well.[22]

macOS, iOS and other Apple OSes

All Apple OSes have moved to Fortuna since at least December 2019, possibly earlier.[23] It is based on SHA-256. Multiple entropy sources such as the secure enclave RNG, boot phase timing jitter, hardware interrupt (timing assumed) are used. RDSEED/RDRAND is used on Intel-based Macs that support it. Seed (entropy) data is also stored for subsequent reboots.

Prior to the change, macOS and iOS used 160-bit Yarrow based on SHA-1.[24]

There is no difference between Шаблон:Mono and Шаблон:Mono; both behave identically.[25][26]

Other operating systems

Шаблон:Mono and Шаблон:Mono are also available on Solaris,[27] NetBSD,[28] Tru64 UNIX 5.1B,[29] AIX 5.2[30] and HP-UX 11i v2.[31] As with FreeBSD, AIX implements its own Yarrow-based design, however AIX uses considerably fewer entropy sources than the standard Шаблон:Mono implementation and stops refilling the pool when it thinks it contains enough entropy.[32]

In Windows NT, similar functionality is delivered by Шаблон:Mono, but reading the special file Шаблон:Mono does not work as in UNIX. The documented methods to generate cryptographically random bytes are CryptGenRandom and RtlGenRandom. Windows PowerShell provides access to a cryptographically secure pseudorandom number generator via the Шаблон:Mono cmdlet.[33]

Cygwin on Windows provides implementations of both Шаблон:Mono and Шаблон:Mono, which can be used in scripts and programs.[34]

See also

References

Шаблон:Reflist

External links