Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp6883074imm; Tue, 24 Jul 2018 04:58:39 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfNwF+0+7JPDIaVP2op9yQjYH694LlfcNX+33KQWdH81JkqsvfgCJuAej/Mp4PDsMR467Eq X-Received: by 2002:a17:902:8f83:: with SMTP id z3-v6mr16608666plo.111.1532433519717; Tue, 24 Jul 2018 04:58:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532433519; cv=none; d=google.com; s=arc-20160816; b=edZuvFx3U1ETzWse28Efr45EieY4EaCayb9WIZpL4t696Jb30TN72DrT/L0BLc9+nG 0yqsArC7e2/kXCLgYrNKo2MbsB6GtspsO8/RlrD2rFf1MSVVR/NGDihK+PHwVg4YDN5v ObW9ZdWLG34+/LsPywA/ixjybmXsUKhfcAQs5EMI7MZkAcQiVJ/eBQXGJo01B4g8TlI6 dfmbMIy0NwMPRxj8ZDWUQNBHlxkmrHFOhfa2qwKNRCFYTgpZtWoYnrPslBafi8d+0A63 vau1jVkT+zPa9ISvqGVKq8aqFkLY7w1LwgHw8cy6s68DgCyB+G9gB31Xt08Sio9n9PT0 AVHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :arc-authentication-results; bh=XaK+u6KH61n7thfFg4/V2mnRsdnyGLg/mlV4hP9qB0g=; b=N3xbIzJk9+hXKpn0uoonZGxMd1CohouPDvtqQIMpRZctvTE+3joNEOMkB1G2zRfcP7 N7wJAugLQc5N1rCbH8DdlQcUB0hgWjgBJoiQj6LEawqKTflHJ68VJ6x8eRTl/5Hdrg8f BDUoEffZL5WyKIM7Vy0kyNybMGHqD6Idi/gQbaJMSKK4nwtZJ0D/p/xbux28isH13wfX U3HJi6aa7Favrrgt7m0w34G5Kn97cZwHmPoVewVsZ00K1+JaKN8eoC7ZpcBXj73k7NyG Ft6RW08l7BAE114dU945P7n7c8x6B1Ua7IfZQBjKEs63BrCWVV7CJ21hMeeYSpK6H8OI bmQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r3-v6si11025497pgg.201.2018.07.24.04.58.25; Tue, 24 Jul 2018 04:58:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388415AbeGXNDb (ORCPT + 99 others); Tue, 24 Jul 2018 09:03:31 -0400 Received: from mx2.suse.de ([195.135.220.15]:34362 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2388280AbeGXNDb (ORCPT ); Tue, 24 Jul 2018 09:03:31 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B7AA7AC9C; Tue, 24 Jul 2018 11:57:21 +0000 (UTC) Message-ID: <1532432981.17797.13.camel@suse.com> Subject: Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption From: Oliver Neukum To: Pavel Machek Cc: Yu Chen , "Rafael J . Wysocki" , Eric Biggers , "Lee, Chun-Yi" , Theodore Ts o , Stephan Mueller , Denis Kenzior , linux-pm@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Gu, Kookoo" , "Zhang, Rui" Date: Tue, 24 Jul 2018 13:49:41 +0200 In-Reply-To: <20180723122227.GA30092@amd> References: <20180718202235.GA4132@amd> <20180718235851.GA22170@sandybridge-desktop> <20180719110149.GA4679@amd> <20180719132003.GA30981@sandybridge-desktop> <20180720102532.GA20284@amd> <1532346156.3057.11.camel@suse.com> <20180723122227.GA30092@amd> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.26.6 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mo, 2018-07-23 at 14:22 +0200, Pavel Machek wrote: > > Yes. But you are objecting to encryption in kernel space at all, > > aren't you? > > I don't particulary love the idea of doing hibernation encryption in > the kernel, correct. > > But we have this weird thing called secure boot, some people seem to > want. So we may need some crypto in the kernel -- but I'd like > something that works with uswsusp, too. Plus, it is mandatory that > patch explains what security guarantees they want to provide against > what kinds of attacks... Hi, very well, maybe we should state clearly that the goal of these patch set is to make Secure Boot and STD coexist. Anything else is a nice side effect, but not the primary justification, right? And we further agree that the model of Secure Boot requires the encryption to be done in kernel space, don't we? Furthermore IMHO the key must also be generated in trusted code, hence in kernel space. Yu Chen, I really cannot see how a symmetrical encryption with a known key can be secure. Regards Oliver