Pitchforks for RDSEED
Pitchforks for RDSEED
Posted Feb 8, 2024 18:27 UTC (Thu) by dullfire (guest, #111432)Parent article: Pitchforks for RDSEED
Sorry but this is a bad statement. The if the system is running with panic_on_warn then the system has explicitly been told to panic (effectively go offline) on a warning event. Which means that it can't be a "denial-of-service" when it is behaving exactly the way the admins[0] requested. Additionally, panic_on_warn turns any ability to generate warnings into a DoS by that definition.
Would you call an admin ssh-ing in running a "sudo reboot" a "denial of service". If so, that makes the term so broad as to be useless.
Further more: If this is occurring after a retry loop of 10 (which, if I did my math right, has less than a 0.001% chance of happening if a 'normal' RDSEED has a failure rate of 30%), then most likely the best case is someone is simply probing you system (or your host) for weaknesses. In the worst case, there's an actual attack in progress. Immediately an panic might be the correct response.
[0] Alternately a non-"admin" managed to control your kernel command line (or equivalent), but if that is the case, you have other, very different, and much worse problems.
Posted Feb 8, 2024 18:29 UTC (Thu)
by corbet (editor, #1)
[Link]
Posted Feb 9, 2024 0:08 UTC (Fri)
by Jannes (subscriber, #80396)
[Link] (1 responses)
A misbehaving app should just crash itself, not bring down the entire kernel and thereby DOSsing all other apps.
Posted Feb 24, 2024 15:14 UTC (Sat)
by DanilaBerezin (guest, #168271)
[Link]
Posted Feb 9, 2024 10:42 UTC (Fri)
by taladar (subscriber, #68407)
[Link] (1 responses)
Posted Feb 9, 2024 13:58 UTC (Fri)
by dullfire (guest, #111432)
[Link]
I think you MIGHT be able to maintain that probably format, if there's a change (possibly delays) you can make to make the next RDSEED mostly unrelated to the first. Also note that isn't not necessary to try accounting for things like another thread attempting to drain entropy (since that would be an attack, in which case a warning, or panic if panic_on_warn, is a perfectly sane response)
IF that's possible[0], then you just need to pick a loop count that makes the likelyhood of successive failures unreasonably small.
Although, honestly I think the sanest course of action would simply to dedicated hardware (that requires privilege to access to use) in the non-cloud case. In my humble opinion the whole notion of confidential cloud compute is intractable, so I have no proposed solutions for it .
[0] I think it should be, but have no proof.
Posted Feb 10, 2024 15:26 UTC (Sat)
by mathstuf (subscriber, #69389)
[Link]
That sounds like you're assuming events are independent. I feel like there's some level of dependence when one is right after another (i.e., failures will cluster).
Yes, the system is behaving as configured in that setting. Still, developers need to be (and are) aware that issuing warnings can have that effect in a fairly wide swath of deployed systems and consider warnings carefully.
panic_on_warn
Pitchforks for RDSEED
Pitchforks for RDSEED
Pitchforks for RDSEED
Pitchforks for RDSEED
Pitchforks for RDSEED