blob: 81361f5abd005c3646b70c74c9742fe0d5ce7e1e [file] [log] [blame]
Alex Gaynoraf82d5e2013-10-29 17:07:24 -07001.. hazmat::
Alex Gaynor0f7f7812013-09-30 10:52:36 -07002
Alex Gaynor8f42fe42013-12-24 13:15:52 -08003OpenSSL Backend
4===============
Donald Stuffte51fb932013-10-27 17:26:17 -04005
Alex Stapletonc368ac22013-12-31 13:43:38 +00006The `OpenSSL`_ C library.
Alex Gaynor6d02e2d2013-09-30 10:37:22 -07007
Alex Gaynorf8796b12013-12-13 20:28:55 -08008.. data:: cryptography.hazmat.backends.openssl.backend
Alex Gaynor6d02e2d2013-09-30 10:37:22 -07009
Paul Kehrer3f17c7c2014-01-20 16:32:26 -060010 This is the exposed API for the OpenSSL backend.
Paul Kehrer2502ce52014-01-18 09:32:47 -060011
Paul Kehrercfa2d622014-01-19 14:01:25 -060012 .. attribute:: name
Paul Kehrer2502ce52014-01-18 09:32:47 -060013
Paul Kehrercfa2d622014-01-19 14:01:25 -060014 The string name of this backend: ``"openssl"``
Alex Gaynor6d02e2d2013-09-30 10:37:22 -070015
Paul Kehrer3f17c7c2014-01-20 16:32:26 -060016 .. method:: register_osrandom_engine()
17
18 Registers the OS random engine as default. This will effectively
19 disable OpenSSL's default CSPRNG.
20
21 .. method:: unregister_osrandom_engine()
22
23 Unregisters the OS random engine if it is default. This will restore
24 the default OpenSSL CSPRNG. If the OS random engine is not the default
25 engine (e.g. if another engine is set as default) nothing will be
26 changed.
27
28OS Random Engine
29----------------
30
Paul Kehrerae2138a2014-01-29 22:19:47 -060031OpenSSL uses a user-space CSPRNG that is seeded from system random (
Paul Kehrer136ff172014-01-29 21:23:11 -060032``/dev/urandom`` or ``CryptGenRandom``). This CSPRNG is not reseeded
33automatically when a process calls ``fork()``. This can result in situations
34where two different processes can return similar or identical keys and
35compromise the security of the system.
Paul Kehrer3f17c7c2014-01-20 16:32:26 -060036
Paul Kehrer136ff172014-01-29 21:23:11 -060037The approach this project has chosen to mitigate this vulnerability is to
38include an engine that replaces the OpenSSL default CSPRNG with one that sources
39its entropy from ``/dev/urandom`` on UNIX-like operating systems and uses
40``CryptGenRandom`` on Windows. This method of pulling from the system pool
41allows us to avoid potential issues with `initializing the RNG`_ as well as
42protecting us from the ``fork()`` weakness.
43
Paul Kehrer8042b292014-01-31 10:44:36 -060044This engine is **active** by default when importing the OpenSSL backend. When
45active this engine will be used to generate all the random data OpenSSL
46requests.
47
48If you wish to deactivate the engine you may call
49``unregister_osrandom_engine()`` on the backend object.
50
51When importing only the binding it is added to the engine list but
52**not activated**.
53
Paul Kehrer3f17c7c2014-01-20 16:32:26 -060054
Paul Kehrer9967bc52014-01-29 21:39:13 -060055OS Random Sources
Paul Kehrer55809a12014-01-29 21:41:16 -060056-----------------
Paul Kehrer9967bc52014-01-29 21:39:13 -060057
58On OS X and FreeBSD ``/dev/urandom`` is an alias for ``/dev/random`` and
59utilizes the `Yarrow`_ algorithm.
60
61On Windows ``CryptGenRandom`` is backed by `Fortuna`_.
62
63Linux uses its own PRNG design. ``/dev/urandom`` is a non-blocking source seeded
Paul Kehrer16e5e4d2014-01-30 09:43:30 -060064from the same pool as ``/dev/random``.
Paul Kehrer9967bc52014-01-29 21:39:13 -060065
66
Alex Gaynor6d02e2d2013-09-30 10:37:22 -070067.. _`OpenSSL`: https://www.openssl.org/
Paul Kehrer136ff172014-01-29 21:23:11 -060068.. _`initializing the RNG`: http://en.wikipedia.org/wiki/OpenSSL#Vulnerability_in_the_Debian_implementation
69.. _`Yarrow`: http://en.wikipedia.org/wiki/Yarrow_algorithm
70.. _`Fortuna`: http://en.wikipedia.org/wiki/Fortuna_(PRNG)