Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750996AbdL3VnL (ORCPT ); Sat, 30 Dec 2017 16:43:11 -0500 Received: from mail-ot0-f194.google.com ([74.125.82.194]:33102 "EHLO mail-ot0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750828AbdL3VnK (ORCPT ); Sat, 30 Dec 2017 16:43:10 -0500 X-Google-Smtp-Source: ACJfBovmr4asxjA5KnLdeyyI7gxsWWHbkwaHRoAzNu9mN9ANEVqJtPl1YjVAOs+SNqdXHRbmHvrj+TYuT9vxJglQGl8= MIME-Version: 1.0 In-Reply-To: <20171230175804.7354-1-alonid@gmail.com> References: <20171230175804.7354-1-alonid@gmail.com> From: Jann Horn Date: Sat, 30 Dec 2017 22:42:49 +0100 Message-ID: Subject: Re: [kernel-hardening] [PATCH 0/5] RFC: Public key encryption of dmesg by the kernel To: Dan Aloni Cc: kernel list , Kernel Hardening Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 893 Lines: 19 On Sat, Dec 30, 2017 at 6:57 PM, Dan Aloni wrote: > From: Dan Aloni > > Hi All, > > There has been a lot of progress in recent times regarding the removal > of sensitive information from dmesg (pointers, etc.), so I figured - why > not encrypt it all? However, I have not found any existing discussions > or references regarding this technical direction. > > I am not sure that desktop and power users would like to have their > kernel message encrypted, but there are scenarios such as in mobile > devices, where only the developers, makers of devices, may actually > benefit from access to kernel prints messages, and the users may be > more protected from exploits. What is the benefit of your approach compared to setting dmesg_restrict=1 or something like that and letting userland decide who should get access to raw dmesg output and in what form?