aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/defconfig
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2010-11-23 23:29:40 (GMT)
committerJouni Malinen <j@w1.fi>2010-11-23 23:29:40 (GMT)
commitbbb921daaacccfac0e5e7085143b83fe5bf49294 (patch)
treebc49f6cce1d4666cda5b35f1fb2e9cc55212a264 /wpa_supplicant/defconfig
parente5851439e30a63e10ac98f3c32fc1c00448a22d9 (diff)
downloadhostap-bbb921daaacccfac0e5e7085143b83fe5bf49294.zip
hostap-bbb921daaacccfac0e5e7085143b83fe5bf49294.tar.gz
hostap-bbb921daaacccfac0e5e7085143b83fe5bf49294.tar.bz2
Maintain internal entropy pool for augmenting random number generation
By default, make hostapd and wpa_supplicant maintain an internal entropy pool that is fed with following information: hostapd: - Probe Request frames (timing, RSSI) - Association events (timing) - SNonce from Supplicants wpa_supplicant: - Scan results (timing, signal/noise) - Association events (timing) The internal pool is used to augment the random numbers generated with the OS mechanism (os_get_random()). While the internal implementation is not expected to be very strong due to limited amount of generic (non-platform specific) information to feed the pool, this may strengthen key derivation on some devices that are not configured to provide strong random numbers through os_get_random() (e.g., /dev/urandom on Linux/BSD). This new mechanism is not supposed to replace proper OS provided random number generation mechanism. The OS mechanism needs to be initialized properly (e.g., hw random number generator, maintaining entropy pool over reboots, etc.) for any of the security assumptions to hold. If the os_get_random() is known to provide strong ramdom data (e.g., on Linux/BSD, the board in question is known to have reliable source of random data from /dev/urandom), the internal hostapd random pool can be disabled. This will save some in binary size and CPU use. However, this should only be considered for builds that are known to be used on devices that meet the requirements described above. The internal pool is disabled by adding CONFIG_NO_RANDOM_POOL=y to the .config file.
Diffstat (limited to 'wpa_supplicant/defconfig')
-rw-r--r--wpa_supplicant/defconfig25
1 files changed, 25 insertions, 0 deletions
diff --git a/wpa_supplicant/defconfig b/wpa_supplicant/defconfig
index 50569e4..c3b2302 100644
--- a/wpa_supplicant/defconfig
+++ b/wpa_supplicant/defconfig
@@ -412,3 +412,28 @@ CONFIG_PEERKEY=y
#LIBS += -lbfd -liberty -lz
#LIBS_p += -lbfd -liberty -lz
#LIBS_c += -lbfd -liberty -lz
+
+# wpa_supplicant depends on strong random number generation being available
+# from the operating system. os_get_random() function is used to fetch random
+# data when needed, e.g., for key generation. On Linux and BSD systems, this
+# works by reading /dev/urandom. It should be noted that the OS entropy pool
+# needs to be properly initialized before wpa_supplicant is started. This is
+# important especially on embedded devices that do not have a hardware random
+# number generator and may by default start up with minimal entropy available
+# for random number generation.
+#
+# As a safety net, wpa_supplicant is by default trying to internally collect
+# additional entropy for generating random data to mix in with the data fetched
+# from the OS. This by itself is not considered to be very strong, but it may
+# help in cases where the system pool is not initialized properly. However, it
+# is very strongly recommended that the system pool is initialized with enough
+# entropy either by using hardware assisted random number generatior or by
+# storing state over device reboots.
+#
+# If the os_get_random() is known to provide strong ramdom data (e.g., on
+# Linux/BSD, the board in question is known to have reliable source of random
+# data from /dev/urandom), the internal wpa_supplicant random pool can be
+# disabled. This will save some in binary size and CPU use. However, this
+# should only be considered for builds that are known to be used on devices
+# that meet the requirements described above.
+#CONFIG_NO_RANDOM_POOL=y