File: readme.txt

package info (click to toggle)
entropybroker 2.9-3
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 1,600 kB
  • sloc: cpp: 14,386; sh: 934; makefile: 188; java: 148; perl: 12
file content (341 lines) | stat: -rw-r--r-- 13,615 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
*** PLEASE NOTE: since 1.0, 'eb' was renamed to 'entropy_broker' ***
*** also the other daemons were renamed ***
*** ALSO: the network protocol has changed so it is no longer ***
*** compatible with older versions (1.1 is also incompatible ***
*** with 1.0) ***
*** ANOTHER NOTE: disk-pools of version 1.0 are NOT compatible ***
*** with the ones of 1.1! ***
*** LAST NOTE: the configuration file changed, see example ***


How it works
------------
The 'entropy_broker' process is the central process of it all. It
collects all entropy data, mixes it within its pool(s), measures
the amount of randomness in that data en then serves it to clients.

server_* processes, which can run in other systems than the
entropy_broker-process, collect the random-data and transmit that
to the central entropy_broker-process.

client_* processes, which also can run everywhere, get random-data
from the central entropy_broker-process and feed that to for
example the local linux-kernel (/dev/random so to say) or to
processes that read from a egb-compatible unix-domain socket.

Most daemons should run on all UNIX systems. The ones that are
Linux-specific are markes as such.

See "design.txt" for details on the crypto used.

See "interfacing.txt" for details on how to connect your own
applications to entropy broker.


Building
--------
	./configure
	make everything install

Files will be installed in  /usr/local/entropybroker 
You need the Crypto++ and zlib development libraries.
libasound2-dev is for eb_server_audio
libusb-1.0-0-dev is for eb_server_usb
libftdi-dev is for eb_server_ComScire_R2000KU
libpcsclite-dev is for eb_server_smartcard
libpng12-dev is for plot
libgd2-noxpm-dev or libgd2-xpm-dev
The configure script will determine which libraries are available
and then select which daemons to build.


Usage
-----
Since version 1.0 all entropy-data is encrypted before it is
transmitted over the network.

Also, clients and servers need to authenticate before they can
talk to the entropybroker.
Then 'my-password.txt' should contain the username and password
(on seperate lines) you want to use. Also the file should only
be readable by the user under which the entropy-broker and/or
servers/clients run.
E.g. use chmod 600 my-password.txt
	eb_server_v4l -X my-password.txt

Passwords should not be longer than 56 characters.

On the server, there should be a password-file too. This file
should contain one users per line, with the password seperated
with a '|', e.g.:
user|password
some user|my password
If you change the password and want to reload the user-file
without restarting the complete broker, sent SIGHUP to it.
Of course the size of the password depends on the cipher you
configure for the password. E.g. 3DES requires 24 characters.
You can also add a 3d and 4th parameter: maximum bps and allow
write access. E.g.:
user|password|1024|yes
This allows the user 'user' to get a maximum of 1024 bits per
second and also allow him to put new data into the server.

All clients and servers need a '-I' commandline parameter.
This parameter can be used 1 or more times. It selects one
(or more) entrop broker instance(s). If one is not reachable,
the other(s) are tried. Examples:
	-I ::ffff:192.168.0.1
	-I [::ffff:192.168.0.1]:12341   with portnumber
	-I hostname.bla.com
	-I hostname.bla.com:55225
	-I [2001:888:13b3:172:a80a:1111:fe0e:daaa]       ipv6
	-I [2001:888:13b3:172:a80a:1111:fe0e:daaa]:1400  with port


server processes
================
On the server, invoke 'entropy_broker' (/usr/local/entropybroker/bin/entropy_broker).
Send a HUP signal to the entropy_broker-daemon to let it log the
current state. E.g. recv/sent requests, etc.
The main entropy broker process listens by default on port
55225 (TCP).

On systems with a spare sound-card, start server_audio. This requires a
functioning ALSA audio sub-system. Look in /proc/asound/devices for the
parameters. For example:
	mauer:/usr/local/entropybroker/var/log# cat /proc/asound/devices 
	  1:        : sequencer
	  2: [ 0- 1]: digital audio playback
	  3: [ 0- 0]: digital audio playback
	  4: [ 0- 0]: digital audio capture
	  5: [ 0- 2]: hardware dependent
	  6: [ 0]   : control
	  7: [ 1- 3]: digital audio playback
	  8: [ 1- 0]: hardware dependent
	  9: [ 1]   : control
	 10: [ 2- 0]: digital audio capture
	 11: [ 2]   : control
	 33:        : timer
In this example there are 3 audio cards (0, 1 and 2, see first column
between [ and ]). If we want to take the audio from card 2 (see line 10)
it would look like this:
eb_server_audio -d hw:2,0 -s -I broker -X 
This program is Linux-only (due to the ALSA requirement).
This program should work with the Johnson Noise 1* produced by the
electronic parts of the sound-card. So it is best, maybe not obvious,
to turn the volume as low as possible.
1* http://en.wikipedia.org/wiki/Johnson%E2%80%93Nyquist_noise

On systems with a spare tv-card/webcam, start server_v4l. E.g.:
eb_server_v4l -I broker -d /dev/video0 -s -X password.txt
This program is Linux-only (due to the video4linux2 requirement).
The same note regarding Johnson Noise (see the audio driver) applies
to this program. On the other hand: LavaRnd (http://www.lavarnd.org/)
works by the principle that what the camera "sees" is moving in a
random way. So either put e.g. a lava-lamp or fishtank in front of
the camera, or tune the tuner of the tv-card to a channel with
only noise or put a cap in front of the lense.

On systems that are mostly idle, start server_timers. Check
http://vanheusden.com/te/#bps to see some expected bitrates.
eb_server_timers -I broker -s -X password.txt
This program compares timers. Due to jitter in their frequency, noise
can be measured.

On systems with an random generator connected to e.g. a serial
port, or with a rng in the motherboard chipset, use server_stream
to feed its data to entropy_broker. For example a rng in the system
would be used like this:
eb_server_stream -I entropy_broker -d /dev/hwrng -s -X password.txt
For example an Orion RNG can be processed at 19200 bps via /dev/ttyS*
An IDQ Quantis has a device node /dev/qrandom0 available
(http://www.idquantique.com/true-random-number-generator/products-overview.html).

On systems with an EntropyKey (http://www.entropykey.co.uk/) or
EGD, start server_egd.
server_egd requires a read-interval and how many bytes to read in
that interval. E.g.:
eb_server_egd -I broker -d /tmp/egd.socket.ekey -a 1024 -b 5 -X password.txt
This would require the following:
	EGDUnixSocket "/tmp/egd.socket.ekey
in the entropy-key daemons configuration (which is
/etc/entropykey/ekeyd.conf on Debian systems).
This program can also connect to EGD servers which listen on a TCP
port.

On systems with a RNG in the chipset that automatically gets send
to the linux kernel entropy buffer, use server_linux_kernel.
This program is Linux-only.

On systems with one or more USB devices attached (can be simple as
a keyboard or a mouse) you can use server_usb. This needs to run
with root access.
This program measures the response time of a device. This program
can be compared to server_timers as it measures the difference
between the clock of the pc and the clock in the usb device.

On systems without any hardware available for retrieving data, one
can, as a last resort, using eb_server_ext_proc. This command can
execute any command (as long as it is supported by the shell) and
feed its output to the broker. E.g.:
eb_server_ext_proc -I localhost -c '(find /proc -type f -print0 | xargs -0 cat ; ps auwx ; sensors -u) | gzip -9' -n -X password.txt

On x86 compatible systems (e.g. not a Sparc), one can use
server_cycle_count. This program is a simplified copy of 
http://www.issihosts.com/haveged/ with the following differences:
- lower bit count
- lower entropy count
This version was implemented to have something that speaks either
entropy_broker or EGD protocol.
This program might work on virtual machines too.

The server daemons that obtain data from hardware sources use
von neumann software whitening.
See: http://en.wikipedia.org/wiki/Hardware_random_number_generator#Software_whitening

If you have a large amount of entropy data available in a file
on disk, you can use eb_server_push_file. Please note that you can
use the data only once.

Use eb_server_ComScire_R2000KU when you have a ComSire R2000KU
device connected via USB.

If you have a ISO 7816 smartcard connected via a PCSC compatible
reader, you can use eb_server_smartcard to use that smartcard
to generate entropy data. This is obtained by sending the 0x84
INS which means "GET CHALLENGE". Note that not all cards
support this command. Two Dutch EMV cards I tried refuse this
command with a 0x6e (class not supported) error. Other cards
return 0x6d (instruction code not supported or invalid).


Proxies
=======
eb_proxy_knuth_m: this proxy mixes to streams (of preferably the
same bit-rate) and feeds it to the broker. For this, algorithm M
(chapter 3.2.2 The Art of Computer Programming (Donald E. Knuth)
Volume 2, Seminumerical Algorithms (3d edition)) is used (also
described in Applied Cryptography by Bruce Schneier, second
edition, chapter 16.11).


client processes
================
To keep the entropy buffer of the local linux kernel filled-up, start
client_linux_kernel as a root user.
If you want the kernel buffers to be filled much earlier (the default
is when it only has 128 bits left), then write a new value to:
/proc/sys/kernel/random/write_wakeup_threshold
E.g.:
	echo 512 > /proc/sys/kernel/random/write_wakeup_threshold
This program is Linux-only.

eb_client_kernel_generic is for other systems like for example 
freebsd and macos x. For it to work, the /dev/random device needs to
accept data written to it. This should be the case for *bsd. The
program accepts a parameter indicating the number of bytes to write
and the number of seconds to sleep between each write.

To server entropy data like as if it was an EGD-server, start
client_egd. E.g.:
	eb_client_egd -d /tmp/egd.sock -I entropy_broker-server.test.com
You may need to delete the socket before starting eb_client_egd.
Now egd-clients can use the /tmp/egd.sock unix domain socket. This
should work with at least OpenSSL: start client_egd with one of the
following parameters: -d /var/run/egd-pool or -d /dev/egd-pool or
-d /etc/egd-pool or -d /etc/entropy
To verify that client_egd functions, run:
  openssl rand -rand /var/run/egd-pool -out /tmp/bla 10
It should return something like
  255 semi-random bytes loaded
where '255' should be > 0. If it is zero, check if the current
user has enough rights to access /var/run/egd-pool
This program can also service via a TCP socket.


Problem resolving
=================
If one of the server processes quits after a while (or even
immediately), then check its logging to see what the problem is.
All processes have the following command-line switches for that:
-s       log to syslog
-l file  log to a file
-n       do not fork: messages will appear in your terminal

Note: logfiles need an absolute path.

Also note: if not a full path is given for the password-file
(for client and server processes), then the program looks in
the directory from the current configuration file.

Please invoke these commands first with -h to see a list of
options. You probably need to use '-I' to select the server(s)
on which 'entropy_broker' runs. Also adding '-s' is usefull as
it'll make the servers/clients/entropy_broker log to syslog.

If a warning appears about mlock() failing you have to options:
- ignore it - but if the system starts swapping, entropy
  data may end up in swap. on the other hand: pools are stored
  in plain on disk anyway...
- increase the maximum amount of memory a process can lock
  in bash this can be done with "ulimit -l n_kb" where n_kb
  is the number of KB a process is allowed to lock


Tips
----
When your system has enough entropy, you can decide to let all
OpenSSL applications use the kernel entropy driver. For that,
in /etc/ssl/openssl.cnf change the line with RANDFILE in it
to:
	RANDFILE = /dev/urandom


Evaluating Entropy Broker
-------------------------
Use eb_client_file to write a couple of bytes to a file.
Then with dieharder:
	http://www.phy.duke.edu/~rgb/General/dieharder.php
and also with ent:
	http://www.fourmilab.ch/random/
you can do some analysis of the randomness of the data.

You can also convert that binary file to a text-file containing
values so that you can analyze it using e.g. confft.
Convert it using:
	./bin_to_values.pl my_bin_file.dat > my_text_file.txt
confft can be retrieved from:
	http://www.vanheusden.com/confft/
You can also directly plot the fft using the do_fft.sh script:
	./do_fft.sh test.dat test.png
This requires gnuplot and confft.

An other option is to do a pixel-plot of some data (the more
the better). Here, for each pixel 2 bytes are taken and then
used as an x and y coordinate. That pixel is then increased
by one. If the result looks like noise, then all is fine.
Patterns are an indication that something is wrong.
To build that binary, invoke:
	make plot
This requires libpng-dev.
To invoke:
	plot input_data.dat result.png


Thanks
------
HÃ¥vard Moen:
	- added config variable to set max number of open files
	- rewritten select/pselect to use poll/ppoll. This is to get around the hardcoded Linux kernel limit of 1024 file descriptors for the select system call. The code has been running nicely with hundreds of clients for a month now
	- added rpm spec file
	- added new qwqng server which uses libqwqng, this is for the ComScire QNG PQ4000KU


License
-------
AGPL-3


Contact info
------------
mail@vanheusden.com