From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mx.groups.io with SMTP id smtpd.web09.2508.1573708512032264181 for ; Wed, 13 Nov 2019 21:15:12 -0800 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: intel.com, ip: 134.134.136.100, mailfrom: jian.j.wang@intel.com) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Nov 2019 21:15:11 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,302,1569308400"; d="scan'208";a="203195727" Received: from fmsmsx106.amr.corp.intel.com ([10.18.124.204]) by fmsmga007.fm.intel.com with ESMTP; 13 Nov 2019 21:15:11 -0800 Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by FMSMSX106.amr.corp.intel.com (10.18.124.204) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 13 Nov 2019 21:15:10 -0800 Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 13 Nov 2019 21:15:10 -0800 Received: from shsmsx108.ccr.corp.intel.com (10.239.4.97) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1713.5 via Frontend Transport; Wed, 13 Nov 2019 21:15:10 -0800 Received: from shsmsx107.ccr.corp.intel.com ([169.254.9.63]) by SHSMSX108.ccr.corp.intel.com ([169.254.8.41]) with mapi id 14.03.0439.000; Thu, 14 Nov 2019 13:15:07 +0800 From: "Wang, Jian J" To: "Kinney, Michael D" , "devel@edk2.groups.io" CC: Ard Biesheuvel , Bret Barkelew , "Zhang, Chao B" , "Wu, Jiaxin" , "Yao, Jiewen" , "Justen, Jordan L" , Laszlo Ersek , "Leif Lindholm" , "Gao, Liming" , "Rabeda, Maciej" , Matthew Carlson , "Ni, Ray" , Sean Brogan , "Fu, Siyuan" , "Lu, XiaoyuX" Subject: Re: [edk2-devel] [PATCH 00/11] Use proper entropy sources Thread-Topic: [edk2-devel] [PATCH 00/11] Use proper entropy sources Thread-Index: AQHVmpG+hddZq5CCkk2bLzAAZZt5VqeKEClQgAAGKyA= Date: Thu, 14 Nov 2019 05:15:06 +0000 Message-ID: References: <20191114021743.3876-1-jian.j.wang@intel.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiZWZiODNkMDUtOGExZS00ZTAxLWE2YjctOTU0MjdmZjg5YWM3IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoiWkpNMnJDUGg2QU1cL1hBV1BKaW1FVGh4R2k4UTdcL2pEOHM3ZlBXN1JubzF6UmVFZWN5WDJrM3VtQjEwXC85T1FocyJ9 x-ctpclassification: CTP_NT dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Return-Path: jian.j.wang@intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Mike, Here're some suggestions: - If OpensslLib library is used, RngLib instance must be specified along with it. - For package dsc, BaseLibRngNull can be used because their main purpose is just for build. - For platforms which don't need random number at all, BaseLibRngNull is recommended. - If drivers HddPasswordDxe/TlsDxe (TlsLib) and/or crypto algorithm like AES/RSA-OAEP/RSA-PK1 are used in a platform, BaseLibRngNull must *not* be used. This rule might change due to the future code base change. - For IA32/X64 platforms, BaseLibRng is recommended as the default library instance to avoid unknown uses of RNG. But the users can choose - RngLibRdSeed, if rdseed is supported for sure and high quality of entropy source is needed; or - DxeRngLibRngProtocol, if EFI_RNG_PROTOCOL is implemented in the platform and only DXE drivers or applications use RNG, or arch independent is more important. - For OVMF, there's already a driver implemented EFI_RNG_PROTOCOL. DxeRngLibRngProtocol is always recommended. - For other ARCH platforms, I don't see implementation of RngLib nor EFI_RNG_PROTOCOL. They have to use BaseRngLibNull or implement their own version of RngLib. There's an ARCH independent solution called CPU Jitter RNG, which has been adopted by Linux. But there's concern that it won't work well in BIOS environment. (see https://www.chronox.de/jent/doc/CPU-Jitter-NPTRNG.html) - If BaseLibRngNull ASSERTs at boot time, there must be some use cases missed. Use a full implementation of RngLib instead. Regards, Jian > -----Original Message----- > From: Kinney, Michael D > Sent: Thursday, November 14, 2019 12:21 PM > To: devel@edk2.groups.io; Wang, Jian J ; Kinney, > Michael D > Cc: Ard Biesheuvel ; Bret Barkelew > ; Zhang, Chao B ; > Wu, Jiaxin ; Yao, Jiewen ; Ju= sten, > Jordan L ; Laszlo Ersek ; = Leif > Lindholm ; Gao, Liming ; > Rabeda, Maciej ; Matthew Carlson > ; Ni, Ray ; Sean Brogan > ; Fu, Siyuan ; Lu, Xiaoy= uX > > Subject: RE: [edk2-devel] [PATCH 00/11] Use proper entropy sources >=20 > Jian, >=20 > In this patch series I see mixed use of different RngLib instances. >=20 > How does a platform developer working on their DSC file know if the > BaseCryptLib services they are using require a Null or a complete > implementation of the RngLib? How does a platform developer know > if they made the wrong choice. >=20 > Thanks, >=20 > Mike >=20 > > -----Original Message----- > > From: devel@edk2.groups.io On > > Behalf Of Wang, Jian J > > Sent: Wednesday, November 13, 2019 6:18 PM > > To: devel@edk2.groups.io > > Cc: Ard Biesheuvel ; Bret > > Barkelew ; Zhang, Chao B > > ; Wu, Jiaxin > > ; Yao, Jiewen > > ; Justen, Jordan L > > ; Laszlo Ersek > > ; Leif Lindholm > > ; Gao, Liming > > ; Rabeda, Maciej > > ; Matthew Carlson > > ; Kinney, Michael D > > ; Ni, Ray > > ; Sean Brogan > > ; Fu, Siyuan > > ; Lu, XiaoyuX > > > > Subject: [edk2-devel] [PATCH 00/11] Use proper entropy > > sources > > > > REF: > > https://bugzilla.tianocore.org/show_bug.cgi?id=3D1871 > > > > Patch series summary: > > - Add BaseRngLibNull to package dsc > > - Add DxeRngLibRngProtocol to make use > > EFI_RNG_PROTOCOL > > - Add RdSeed interface and RngLibRdSeed for IA32/X64 > > arch > > - Remove following files > > rand_pool_noise.h > > rand_pool_noise_tsc.c > > rand_pool_noise.c > > - Update rand_pool.c to use RngLib interface directly > > and the drop the TimerLib depenency from OpensslLib > > - Update OVMF platform dsc to use DxeRngLibRngProtocol > > when necessary > > > > Cc: Ard Biesheuvel > > Cc: Bret Barkelew > > Cc: Chao Zhang > > Cc: Jiaxin Wu > > Cc: Jiewen Yao > > Cc: Jordan Justen > > Cc: Laszlo Ersek > > Cc: Leif Lindholm > > Cc: Liming Gao > > Cc: Maciej Rabeda > > Cc: Matthew Carlson > > Cc: Michael D Kinney > > Cc: Ray Ni > > Cc: Sean Brogan > > Cc: Siyuan Fu > > Cc: Xiaoyu Lu > > > > Jian J Wang (11): > > NetworkPkg/NetworkPkg.dsc: specify RngLib instance > > for build > > SignedCapsulePkg/SignedCapsulePkg.dsc: specify RngLib > > instances > > FmpDevicePkg/FmpDevicePkg.dsc: specify RngLib > > instances in dsc files > > MdePkg/BaseLib: add interface to wrap rdseed IA > > instruction > > SecurityPkg/RngLibRdSeed: add an instance of RngLib > > to make use rdseed > > SecurityPkg/DxeRngLibRngProtocol: add RNG protocol > > version of RngLib > > SecurityPkg/SecurityPkg.dsc: add new RngLib instances > > for build > > OvmfPkg: specify RngLib instances in dsc files > > ArmVirtPkg/ArmVirt.dsc.inc: specify RngLib instances > > in dsc files > > CryptoPkg/OpensslLib: use RngLib to get high quality > > random entropy > > FmpDevicePkg/FmpDevicePkg.dsc: remove TimerLib > > instance > > > > ArmVirtPkg/ArmVirt.dsc.inc | 2 + > > CryptoPkg/CryptoPkg.dsc | 1 + > > CryptoPkg/Library/OpensslLib/OpensslLib.inf | 15 +- > > .../Library/OpensslLib/OpensslLibCrypto.inf | 15 +- > > CryptoPkg/Library/OpensslLib/rand_pool.c | 253 > > ++---------------- > > .../Library/OpensslLib/rand_pool_noise.c | 29 -- > > .../Library/OpensslLib/rand_pool_noise.h | 29 -- > > .../Library/OpensslLib/rand_pool_noise_tsc.c | 43 -- > > - > > FmpDevicePkg/FmpDevicePkg.dsc | 2 +- > > MdePkg/Include/Library/BaseLib.h | 51 > > ++++ > > MdePkg/Library/BaseLib/BaseLib.inf | 4 + > > MdePkg/Library/BaseLib/BaseLibInternals.h | 46 > > ++++ > > MdePkg/Library/BaseLib/Ia32/RdSeed.nasm | 87 > > ++++++ > > MdePkg/Library/BaseLib/X64/RdSeed.nasm | 80 > > ++++++ > > MdePkg/Library/BaseLib/X86RdSeed.c | 73 > > +++++ > > NetworkPkg/NetworkPkg.dsc | 1 + > > OvmfPkg/OvmfPkgIa32.dsc | 5 + > > OvmfPkg/OvmfPkgIa32X64.dsc | 5 + > > OvmfPkg/OvmfPkgX64.dsc | 5 + > > OvmfPkg/OvmfXen.dsc | 5 + > > .../DxeRngLibRngProtocol.c | 200 > > ++++++++++++++ > > .../DxeRngLibRngProtocol.inf | 42 > > +++ > > .../DxeRngLibRngProtocol.uni | 14 + > > .../RngLibRdSeed/RngLibRdSeed.inf | 37 > > +++ > > .../RngLibRdSeed/RngLibRdSeed.uni | 18 ++ > > .../RngLibRdSeed/RngRdSeed.c | 189 > > +++++++++++++ > > SecurityPkg/SecurityPkg.dsc | 6 + > > SignedCapsulePkg/SignedCapsulePkg.dsc | 6 + > > 28 files changed, 909 insertions(+), 354 deletions(-) > > delete mode 100644 > > CryptoPkg/Library/OpensslLib/rand_pool_noise.c > > delete mode 100644 > > CryptoPkg/Library/OpensslLib/rand_pool_noise.h > > delete mode 100644 > > CryptoPkg/Library/OpensslLib/rand_pool_noise_tsc.c > > create mode 100644 > > MdePkg/Library/BaseLib/Ia32/RdSeed.nasm > > create mode 100644 > > MdePkg/Library/BaseLib/X64/RdSeed.nasm > > create mode 100644 MdePkg/Library/BaseLib/X86RdSeed.c > > create mode 100644 > > SecurityPkg/RandomNumberGenerator/DxeRngLibRngProtocol/ > > DxeRngLibRngProtocol.c > > create mode 100644 > > SecurityPkg/RandomNumberGenerator/DxeRngLibRngProtocol/ > > DxeRngLibRngProtocol.inf > > create mode 100644 > > SecurityPkg/RandomNumberGenerator/DxeRngLibRngProtocol/ > > DxeRngLibRngProtocol.uni > > create mode 100644 > > SecurityPkg/RandomNumberGenerator/RngLibRdSeed/RngLibRd > > Seed.inf > > create mode 100644 > > SecurityPkg/RandomNumberGenerator/RngLibRdSeed/RngLibRd > > Seed.uni > > create mode 100644 > > SecurityPkg/RandomNumberGenerator/RngLibRdSeed/RngRdSee > > d.c > > > > -- > > 2.17.1.windows.2 > > > > > >=20