Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp7351913ybp; Wed, 16 Oct 2019 07:30:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqzbkKkMVwJtf57+ZwS/olrAW1InCvYTVluRO5LQ/J/ahqLhhyexoiCakD328M1CElClFZoI X-Received: by 2002:a17:906:16d2:: with SMTP id t18mr1225239ejd.28.1571236230722; Wed, 16 Oct 2019 07:30:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571236230; cv=none; d=google.com; s=arc-20160816; b=W98Ehy6Ic7hs+2iIzOLFy8a1dqKg7hjDH6bDlNZWVCuD004qakKtgKlaKwHqVMz1k6 Z1ZrniHbRfNZuMVEZWqaU93XUVcX+mbbL7E7BdvSIQGaFTuTQxKAJ81OWbjGkJ1Gc1mS 0d/1c93By//MMx2iuc/O+yaQEA5iHvFxexr/Qtc/e0tfzMpmLYu6AQVmjBhHULAD5GKO yRUh+nMCv/48gBNZx4mYej4sRXB65FXJVfsjM9IPG+PcxDEndw+SuPSASlFR8tKv668B c3yu5tpFJMsObhaG4aV/m1N6bPtgPYyLblXxkecFgHVMRoIq1B5WNleZUTHu6MUskCC4 WDQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=UZWgyfZ91Wi3Gb3weqCkIouMwqrEEocIQIXdXwINGL0=; b=koXP/3GBxjQ+wH9dcVIT8wB2fiaA2X1dN96tPCarE/+qkFONIX5O41AC3VbkNbm3oR YuuMAKJjyZ2TBWT2qHEGghI4kKZMEXPGGZypJQGut4iULDUhswQAWaQBSCcLE7kV0GAc a46maqCJL9XginKsOJT+Ea0ls216L8oJI9TI9XLYN4lXxbsxex+QBMLaYRZNZNXL3byc bmEqM5zGqZUln8YfD2h+VhTQwe8EHR4wMqbTZbtHwTemOEEseCd2KnA36xGW/cekgiY8 tHLsn9fzAxFKz/2A0EZL7LEv30T1+GJQgP3aZoNmN1CSkdn7IBkYBOhQldQESD1GQIIg NSNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z6si17419543edm.316.2019.10.16.07.30.06; Wed, 16 Oct 2019 07:30:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392200AbfJPKlO (ORCPT + 99 others); Wed, 16 Oct 2019 06:41:14 -0400 Received: from mga12.intel.com ([192.55.52.136]:18006 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726259AbfJPKlO (ORCPT ); Wed, 16 Oct 2019 06:41:14 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 Oct 2019 03:41:13 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,303,1566889200"; d="scan'208";a="220735670" Received: from jsakkine-mobl1.tm.intel.com (HELO localhost) ([10.237.50.130]) by fmsmga004.fm.intel.com with ESMTP; 16 Oct 2019 03:41:11 -0700 Date: Wed, 16 Oct 2019 13:41:10 +0300 From: Jarkko Sakkinen To: Janne Karhunen Cc: linux-integrity@vger.kernel.org, David Safford , Pascal Van Leeuwen , James Bottomley , Peter Huewe , Jason Gunthorpe , Arnd Bergmann , Greg Kroah-Hartman , open list , Mimi Zohar Subject: Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes() Message-ID: <20191016104110.GB10184@linux.intel.com> References: <20191015124702.633-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 16, 2019 at 10:02:01AM +0300, Janne Karhunen wrote: > On Tue, Oct 15, 2019 at 3:50 PM Jarkko Sakkinen > wrote: > > > > Salt the result that comes from the TPM RNG with random bytes from the > > kernel RNG. This will allow to use tpm_get_random() as a substitute for > > get_random_bytes(). TPM could have a bug (making results predicatable), > > backdoor or even an inteposer in the bus. Salting gives protections > > against these concerns. > > The current issue in the randomness from my point of view is that > encrypted filesystems, ima etc in common deployments require high > quality entropy just few seconds after the system has powered on for > the first time. It is likely that people want to keep their keys > device specific, so the keys need to be generated on the first boot > before any of the filesystems mount. This patch does not have the described issue. Which call sites are you talking about? /Jarkko