[Cryptography] Use of RDRAND in Haskell's TLS RNG?

David Johnston dj at deadhat.com
Sat Nov 26 15:52:41 EST 2016


On 11/25/16 12:55 PM, Arnold Reinhold wrote:

> On 11/23/2016 02:23 AM, Darren Moffat wrote:
>> What is a "proper audit" and why do you think that Intel hasn't done that
>> already ? What more find they (or any chip designer/builder) do to convince
>> you?
> In addition the need for a proper published audit that bear suggested, the most glaring defect in the Intel design is the lack of access to the un-whitened random bits. Adding a mode that bypassed the whitener would have been simple. Statistical analysis of the raw bit stream can provide ongoing assurance that the RNG is doing what it says. Likely there will be correlations between raw bit statistics and external parameters such as chip temperature and supply voltage. Of course it is possible for a deterministic generator to mimic such variations, but it would have to have a relatively large footprint on the die compared to simply using the whitener in a feedback mode or similar mischief.
This has been addressed multiple times on this list so once again:

The raw access mode is disabled on production parts. This is because it 
would be an attack vector. Log into a VM in a cloud machine and put the 
RNG into raw mode and other processes in other VMs would then be getting 
unwhitened data while thinking they were getting the output of a CSPRNG 
(RdRand) or an ENRBG (RdSeed).

If we enabled ring 0 processes to put the shared RNG in raw mode to 
satisfy the curiosity of people on this list we would be enabling an 
attack on most users. Also we would be violating the FIPS140-2 and 
SP800-90 requirements. The quality of the raw data is tested internally 
to the DRNG with the algorithms we have published.

Feel free to talk to NIST about adding things to their specs to enable 
raw access in while simultaneously in a FIPS context and a cloud context.

DJ





More information about the cryptography mailing list