Re: [Pdns-users] Random (was: When to do a key rollover?)

2011-05-11 Thread Posner, Sebastian
bert hubert wrote:

> > Perhaps a question for everybody.. How do make yure you have enough
> > *good* random for (frequent) key generation for (many) different
> > zones?
> 
> I've heard good things about http://www.entropykey.co.uk/ . 
> This is a sort of halfway solution - I'd not suggest just using 
> /dev/urandom afterwards for state secrets ;-) but it looks pretty good.
> 
> I just ordered one to find out.

Looks interesting indeed; but one should care to use a case-internal
non-hotplug-accessible USB-port for it; otherwise it would be a perfect
hardware-DOS on the nameserver..

> > Same KSK/ZSK for all deployed zones to reduce the amount of 
> > random cyclically needed? Write a script to query random.org? 
> > Invest $BIGBUCKS to purchase expensive TRNG-Hardware? 
> > Use /dev/urandom instead? o.O
> 
> There are other solutions too - you could for example create a 
> large random stream based on a single piece of high quality random. 
> For example, take 256 bits of high quality random and encrypt several 
> gigabytes of /dev/urandom with it. Take care never to store the 256 
> bits and you should be good to go.

Memories, please come back..! xD 
I had a discussion on this topic some time ago (this question 
keeps turning my mind) with a friend of mine; he's just working 
on his PhD on a random-heavy subject, and we spent quite a time
discussing (or me listening to him^^) how or how not to improve
the quality of given random; but the bottom-line slipped my mind -.-




And I completely forgot to elaborate on the possibilities that
came to my mind for this..^^

One good thing was the Intel 80802 firmware hub; part of the 
840-series Intel PIII-chipset, which included a TRNG using 
thermal noise. Sadly; this wasn't continued in later models.

A DIY-Idea was integrating a sound card into the server and
connect a mistuned radio to the audio-in to use this static 
noise for random.


The idea currently in evaluation is using smaller players for 
server-hardware: Since 2003, VIA develops the PadLock security 
engine, which includes an on-chip-TRNG in the processor-die 
which generates thermal noise based random at quite a high rate.
And this is included in almost any given VIA-CPU since then.

So, next to all the AMD and Intel-driven HP, Dell, IBM and
other bolides in the server-room, soon there might one or
two noname VIA-powered machines ;)

The linux-kernel already supports this TRNG; you only need
to load the via_rng-module. The only drawback: This module
doesn't fill /dev/random but uses /dev/hwrandom; that's why I
asked for changing pdns' source of random.

Sebastian
-- 
baboo
___
Pdns-users mailing list
Pdns-users@mailman.powerdns.com
http://mailman.powerdns.com/mailman/listinfo/pdns-users


Re: [Pdns-users] Random (was: When to do a key rollover?)

2011-05-11 Thread bert hubert
On Wed, May 11, 2011 at 08:19:01PM +0200, Posner, Sebastian wrote:
> >Otherwise, create a fresh and immediately active key
> > If the active ZSK will expire soon, create a spare key
> 
> These last two lines implicate another question: Is there any 
> possibility to influence the source of random used by pdns to create keys?

Hmm, no. This is because right now you can use many engines to create a key,
and each has different ways of gathering random.

For PowerDNS itself, you could use the 'entropy-source' setting.

Another solution is to create keys using an external tool and use pdnssec
import-zone-key.

> Perhaps a question for everybody.. How do make yure you have enough
> *good* random for (frequent) key generation for (many) different zones?

I've heard good things about http://www.entropykey.co.uk/ . This is a sort
of halfway solution - I'd not suggest just using /dev/urandom afterwards for
state secrets ;-) but it looks pretty good.

I just ordered one to find out.

> Same KSK/ZSK for all deployed zones to reduce the amount of random
> cyclically needed? Write a script to query random.org? Invest $BIGBUCKS
> to purchase expensive TRNG-Hardware? Use /dev/urandom instead? o.O

There are other solutions too - you could for example create a large random
stream based on a single piece of high quality random. For example, take 256
bits of high quality random and encrypt several gigabytes of /dev/urandom
with it. Take care never to store the 256 bits and you should be good to go.

The entropykey looks pretty good though for a 'no thinking' solution.

Bert
___
Pdns-users mailing list
Pdns-users@mailman.powerdns.com
http://mailman.powerdns.com/mailman/listinfo/pdns-users


[Pdns-users] Random (was: When to do a key rollover?)

2011-05-11 Thread Posner, Sebastian
Maik Zumstrull wrote:

[key rollover]

> The basic logic per zone is:
> 
> Disable any expired ZSKs
> Make sure there is an active ZSK
>If we already have a fresh spare key, enable it

>Otherwise, create a fresh and immediately active key
> If the active ZSK will expire soon, create a spare key

These last two lines implicate another question: Is there any 
possibility to influence the source of random used by pdns to create keys?

On a server, typically there is not much in /dev/random as there are 
typically no user interactions, and if you issue a hidden primary for 
DNSSECing your zones there is even less IO or other random things that
happen on machines to fill the pool.

Perhaps a question for everybody.. How do make yure you have enough
*good* random for (frequent) key generation for (many) different zones?

Same KSK/ZSK for all deployed zones to reduce the amount of random
cyclically needed? Write a script to query random.org? Invest $BIGBUCKS
to purchase expensive TRNG-Hardware? Use /dev/urandom instead? o.O

Sebastian
-- 
baboo
___
Pdns-users mailing list
Pdns-users@mailman.powerdns.com
http://mailman.powerdns.com/mailman/listinfo/pdns-users