Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755727AbbESRzq (ORCPT ); Tue, 19 May 2015 13:55:46 -0400 Received: from imap.thunk.org ([74.207.234.97]:45753 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751416AbbESRzn (ORCPT ); Tue, 19 May 2015 13:55:43 -0400 Date: Tue, 19 May 2015 13:55:10 -0400 From: "Theodore Ts'o" To: David Howells Cc: Andy Lutomirski , Andy Lutomirski , Linus Torvalds , Michal Marek , David Woodhouse , Abelardo Ricart III , Linux Kernel Mailing List , Sedat Dilek , keyrings@linux-nfs.org, Rusty Russell , LSM List , Borislav Petkov , Jiri Kosina Subject: Re: Should we automatically generate a module signing key at all? Message-ID: <20150519175510.GB26822@thunk.org> Mail-Followup-To: Theodore Ts'o , David Howells , Andy Lutomirski , Andy Lutomirski , Linus Torvalds , Michal Marek , David Woodhouse , Abelardo Ricart III , Linux Kernel Mailing List , Sedat Dilek , keyrings@linux-nfs.org, Rusty Russell , LSM List , Borislav Petkov , Jiri Kosina References: <20150519155532.GB2871@thunk.org> <31154.1431965087@warthog.procyon.org.uk> <555A88FB.7000809@kernel.org> <29742.1432025631@warthog.procyon.org.uk> <1752.1432049417@warthog.procyon.org.uk> <3253.1432052599@warthog.procyon.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3253.1432052599@warthog.procyon.org.uk> User-Agent: Mutt/1.5.23 (2014-03-12) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1070 Lines: 20 On Tue, May 19, 2015 at 05:23:19PM +0100, David Howells wrote: > Did you mean make it possible to only use external hardware for storing the > key? That wouldn't very convenient for building our kernels in our build farm > - we have a lot of machines and all of them would have to be equiped with the > key. Besides, we *want* to discard the private key where possible as soon as > possible because then we can't leak it and we can't be forced to disclose it. Oh, so you are generating a one-time key for each kernel build, and then dropping the public key into a cert which is then signed by some trusted CA system? (Which I presume *would* be done with the private key stored in some trusted secured hardware --- i.e., YubiKey, SmartCard, or some other tempest-shielded hardware designed for use by CA's)? - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/