Showing
3 changed files
with
308 additions
and
0 deletions
.gitignore
0 → 100644
1 | +.*.swp | ||
2 | +*.o | ||
3 | +*.a | ||
4 | +*.gcda | ||
5 | +*.gcno | ||
6 | +.dirstamp | ||
7 | +.deps/ | ||
8 | +Makefile | ||
9 | +Makefile.in | ||
10 | +/config* | ||
11 | +m4/ | ||
12 | +/docs/ | ||
13 | +/INSTALL | ||
14 | +coverage.base | ||
15 | +coverage.run | ||
16 | +coverage.info | ||
17 | +coveragereport/ | ||
18 | +*.m4 | ||
19 | +/autom4te.cache/ | ||
20 | +/compile | ||
21 | +/depcomp | ||
22 | +/docs/ | ||
23 | +/install-sh | ||
24 | +/libtool | ||
25 | +/ltmain.sh | ||
26 | +/missing | ||
27 | +stamp-h1 | ||
28 | +src/taskrambler | ||
29 | +/tests/*Test | ||
30 | +gmon.out |
Makefile.am
0 → 100644
1 | +## This is the shared library to be built | ||
2 | +lib_LTLIBRARIES = libmodentropy.la | ||
3 | + | ||
4 | +## Define the source file for the module | ||
5 | +libmodentropy_la_SOURCES = mod_entropy.c mod_entropy_get_entropy_bits.c \ | ||
6 | + mod_entropy_add_entropy.c | ||
7 | +libmodentropy_la_LDFLAGS = -lrt -lm | ||
8 | + | ||
9 | +install: libmodentropy.la | ||
10 | + apxs -i -a -n entropy libmodentropy.la | ||
11 | + | ||
12 | +## Define that an include directory is required. | ||
13 | +#INCLUDES = -I@apache_dir@/include -I/usr/include/apr-1 | ||
14 | + |
mod_entropy.c
0 → 100644
1 | +/** | ||
2 | + * this filter generates a sha1 from the current microtime and request | ||
3 | + * useses this to fill the linux random source. | ||
4 | + * | ||
5 | + * inspired by timed_entropyd. | ||
6 | + * | ||
7 | + * ATTENTION: This module is not portable right now as i don't know | ||
8 | + * howto fill the random source for other systems. It is linux only. | ||
9 | + * | ||
10 | + * Most time was spend in figuring out how to write apache modules. | ||
11 | + * | ||
12 | + * \author Georg Hopp <georg@steffers.org> | ||
13 | + */ | ||
14 | +#define _POSIX_C_SOURCE 199309L | ||
15 | + | ||
16 | +#include <apache2/httpd.h> | ||
17 | +#include <apache2/http_core.h> | ||
18 | +#include <apr-1/apu.h> | ||
19 | +#include <apr-1/apr_general.h> | ||
20 | +#include <apr-1/apr_sha1.h> | ||
21 | + | ||
22 | +#include <time.h> | ||
23 | +#include <math.h> | ||
24 | +#include <fcntl.h> | ||
25 | +#include <errno.h> | ||
26 | +#include <linux/random.h> | ||
27 | +#include <sys/ioctl.h> | ||
28 | +#include <sys/types.h> | ||
29 | +#include <sys/stat.h> | ||
30 | + | ||
31 | +#define min(x, y) ((x)<(y)?(x):(y)) | ||
32 | + | ||
33 | + | ||
34 | +module AP_MODULE_DECLARE_DATA entropy_module; | ||
35 | + | ||
36 | +char * getData(const char *, size_t); | ||
37 | + | ||
38 | +/** | ||
39 | + * This is taken from timer_entropyd and modified so | ||
40 | + * that the constant 1/log(2.0) is not calculated but | ||
41 | + * set directly. | ||
42 | + * | ||
43 | + * As far as i can say this correlates to the shannon | ||
44 | + * entropy algorithm with equal probabilities | ||
45 | + * for entropy where the entropy units are bits. | ||
46 | + * | ||
47 | + * But actually i am no mathemacian and my analysis capabilities | ||
48 | + * are limited. Additionally i have not analysed the linux random | ||
49 | + * character device code, so i trusted the code in timer_entropyd. | ||
50 | + */ | ||
51 | +static | ||
52 | +int | ||
53 | +get_entropy(const unsigned char * data, size_t ndata) | ||
54 | +{ | ||
55 | + size_t byte_count[256]; | ||
56 | + size_t iterator; | ||
57 | + static double log2inv = 1.442695; //!< 1 / log(2.0): the entropy unit size | ||
58 | + double entropy = 0.0; | ||
59 | + | ||
60 | + memset(byte_count, 0, sizeof(byte_count)); | ||
61 | + | ||
62 | + /** | ||
63 | + * first get the amount each byte occurs in the array | ||
64 | + */ | ||
65 | + for (iterator = 0; iterator < ndata; iterator++) { | ||
66 | + byte_count[data[iterator]]++; | ||
67 | + } | ||
68 | + | ||
69 | + for (iterator = 0; iterator < 256; iterator++) { | ||
70 | + double probability = (double)byte_count[iterator] / (double)ndata; | ||
71 | + | ||
72 | + if (0.0 < probability) { | ||
73 | + entropy += probability * log2inv * (log(1.0 / probability)); | ||
74 | + } | ||
75 | + } | ||
76 | + | ||
77 | + entropy *= (double)ndata; | ||
78 | + entropy = (entropy < 0.0)? 0.0 : entropy; | ||
79 | + entropy = min((double)(ndata * 8), entropy); | ||
80 | + | ||
81 | + return entropy; | ||
82 | +} | ||
83 | + | ||
84 | +static | ||
85 | +int | ||
86 | +header_do_print(void * rec, const char * key, const char * value) | ||
87 | +{ | ||
88 | + apr_sha1_ctx_t * sha1_ctx = rec; | ||
89 | + | ||
90 | + apr_sha1_update(sha1_ctx, value, strlen(value)); | ||
91 | + | ||
92 | + return 1; | ||
93 | +} | ||
94 | + | ||
95 | +static | ||
96 | +apr_status_t | ||
97 | +entropy_filter_in( | ||
98 | + ap_filter_t * filter, | ||
99 | + apr_bucket_brigade * brigade, | ||
100 | + ap_input_mode_t mode, | ||
101 | + apr_read_type_e block, | ||
102 | + apr_off_t readbytes) | ||
103 | +{ | ||
104 | + apr_bucket * bucket; | ||
105 | + apr_status_t status; | ||
106 | + request_rec * request = filter->r; | ||
107 | + conn_rec * connection = filter->c; | ||
108 | + apr_sha1_ctx_t sha1_ctx; | ||
109 | + unsigned char digest[APR_SHA1_DIGESTSIZE]; | ||
110 | + | ||
111 | + struct timespec ts; | ||
112 | + | ||
113 | + clock_gettime(CLOCK_REALTIME, &ts); | ||
114 | + | ||
115 | + apr_sha1_init(&sha1_ctx); | ||
116 | + | ||
117 | + /** | ||
118 | + * add current microtime to sha1 | ||
119 | + */ | ||
120 | + apr_sha1_update_binary( | ||
121 | + &sha1_ctx, | ||
122 | + (const unsigned char *)&ts, | ||
123 | + sizeof(ts)); | ||
124 | + | ||
125 | + /** | ||
126 | + * add client ip to sha1 | ||
127 | + */ | ||
128 | + apr_sha1_update( | ||
129 | + &sha1_ctx, | ||
130 | + connection->client_ip, | ||
131 | + strlen(connection->client_ip)); | ||
132 | + | ||
133 | + /** | ||
134 | + * add request line to sha1 | ||
135 | + */ | ||
136 | + apr_sha1_update( | ||
137 | + &sha1_ctx, | ||
138 | + request->the_request, | ||
139 | + strlen(request->the_request)); | ||
140 | + | ||
141 | + /** | ||
142 | + * add all header values to sha1 | ||
143 | + */ | ||
144 | + apr_table_do(header_do_print, &sha1_ctx, request->headers_in, NULL); | ||
145 | + | ||
146 | + /** | ||
147 | + * get the request body and add it to the sha1 | ||
148 | + */ | ||
149 | + status = ap_get_brigade(filter->next, brigade, mode, block, readbytes); | ||
150 | + | ||
151 | + if (status == APR_SUCCESS) { | ||
152 | + for ( | ||
153 | + bucket = APR_BRIGADE_FIRST(brigade); | ||
154 | + bucket != APR_BRIGADE_SENTINEL(brigade); | ||
155 | + bucket = APR_BUCKET_NEXT(bucket)) { | ||
156 | + | ||
157 | + if (!(APR_BUCKET_IS_METADATA(bucket))) { | ||
158 | + const char * buffer; | ||
159 | + apr_size_t nbuffer; | ||
160 | + | ||
161 | + status = apr_bucket_read( | ||
162 | + bucket, | ||
163 | + &buffer, | ||
164 | + &nbuffer, | ||
165 | + APR_BLOCK_READ); | ||
166 | + | ||
167 | + if (status == APR_SUCCESS) { | ||
168 | + apr_sha1_update(&sha1_ctx, buffer, nbuffer); | ||
169 | + } | ||
170 | + } | ||
171 | + } | ||
172 | + } | ||
173 | + | ||
174 | + /** | ||
175 | + * get the sha1 digest | ||
176 | + */ | ||
177 | + apr_sha1_final(digest, &sha1_ctx); | ||
178 | + | ||
179 | + /** | ||
180 | + * fill /dev/random with sha1 from current request | ||
181 | + */ | ||
182 | + { | ||
183 | + int i; | ||
184 | + int entropy = get_entropy(digest, APR_SHA1_DIGESTSIZE); | ||
185 | + int fd = open("/dev/random", O_WRONLY|O_NONBLOCK); | ||
186 | + struct rand_pool_info * output; | ||
187 | + | ||
188 | + output = (struct rand_pool_info *)malloc( | ||
189 | + sizeof(struct rand_pool_info) + APR_SHA1_DIGESTSIZE); | ||
190 | + | ||
191 | + output->entropy_count = entropy; | ||
192 | + output->buf_size = APR_SHA1_DIGESTSIZE; | ||
193 | + memcpy(output->buf, digest, APR_SHA1_DIGESTSIZE); | ||
194 | + | ||
195 | + fprintf(stderr, "sha1 so far: "); | ||
196 | + for (i=0; i<APR_SHA1_DIGESTSIZE; i++) { | ||
197 | + fprintf(stderr, "%02x", digest[i]); | ||
198 | + } | ||
199 | + fprintf(stderr, "\n"); | ||
200 | + fprintf(stderr, "entropy bits: %d\n", entropy); | ||
201 | + | ||
202 | + if (ioctl(fd, RNDADDENTROPY, output) == -1) { | ||
203 | + switch(errno) { | ||
204 | + case EBADF: | ||
205 | + fprintf(stderr, "ioctl failed: no valid file descriptor %d\n", fd); | ||
206 | + break; | ||
207 | + | ||
208 | + case EFAULT: | ||
209 | + fprintf(stderr, "ioctl failed: invalid argument: %p\n", output); | ||
210 | + break; | ||
211 | + | ||
212 | + case EINVAL: | ||
213 | + fprintf(stderr, "ioctl failed: invalid request\n", errno); | ||
214 | + break; | ||
215 | + | ||
216 | + case ENOTTY: | ||
217 | + fprintf(stderr, "ioctl failed: discriptor not associated to character device\n", errno); | ||
218 | + break; | ||
219 | + | ||
220 | + case EPERM: | ||
221 | + fprintf(stderr, "ioctl failed: invalid permissions\n", errno); | ||
222 | + break; | ||
223 | + | ||
224 | + default: | ||
225 | + fprintf(stderr, "ioctl(RNDADDENTROPY) failed: %d\n", errno); | ||
226 | + break; | ||
227 | + } | ||
228 | + } | ||
229 | + | ||
230 | + free(output); | ||
231 | + close(fd); | ||
232 | + } | ||
233 | + fflush(stderr); | ||
234 | + | ||
235 | + ap_remove_input_filter(filter); | ||
236 | + | ||
237 | + return status; | ||
238 | +} | ||
239 | + | ||
240 | +/** | ||
241 | + * apache module initialization | ||
242 | + */ | ||
243 | +static | ||
244 | +void | ||
245 | +entropy_register_hook(apr_pool_t *p) | ||
246 | +{ | ||
247 | + ap_register_input_filter( | ||
248 | + "ENTROPY", | ||
249 | + entropy_filter_in, | ||
250 | + NULL, | ||
251 | + AP_FTYPE_CONTENT_SET); | ||
252 | +} | ||
253 | + | ||
254 | +module AP_MODULE_DECLARE_DATA entropy_module = { | ||
255 | + STANDARD20_MODULE_STUFF, | ||
256 | + NULL, /* create per-directory config structure */ | ||
257 | + NULL, /* merge per-directory config structures */ | ||
258 | + NULL, /* create per-server config structure */ | ||
259 | + NULL, /* merge per-server config structures */ | ||
260 | + NULL, /* command apr_table_t */ | ||
261 | + entropy_register_hook /* register hooks */ | ||
262 | +}; | ||
263 | + | ||
264 | +// vim: set ts=4 sw=4: |
Please
register
or
login
to post a comment