Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp6952921imm; Tue, 24 Jul 2018 06:06:41 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdSrnYwV0HRYGdVoqLlDcfbF3HaROVHYOAGG7AiypUjvBpNcjRy18U3HoEpNe9o7rF3nhoW X-Received: by 2002:a62:642:: with SMTP id 63-v6mr17822061pfg.222.1532437601648; Tue, 24 Jul 2018 06:06:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532437601; cv=none; d=google.com; s=arc-20160816; b=QDLcOvdsgMgKhFvdCVR6Ih2PNKKQX6SOcZMNBCya82JpXVm3e83IN+iSwZb/s/zgN6 cjquW15numTxgNmRfzs4nGMNNsd6xE58HjLd4IxEg8ZLyyvY2UlFaRme5GnMkmgFoqjU SYSTlsCobpUt3qBSqsJODNDp4nCXDkf5p8mRPeOEYQkiQuP+/1vkreFIXHhMnOBzE16y mNjC0+i3zDMUw3u3ERyibZw/WQYz837OTKkg7aONcVZRMA1Qcex+WDG5CSwYjK4l62+5 ENkoWmCv3uXtFAb3v/yc0UF9dnaKocenJZNX4ZUX3YNlCmlRaima4V5KwrQkvsM80+7W H79Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=jjhzOjYGeMAG5R6wVKevjtgtwM3TQRsDjHVwhbgKlwA=; b=MaOYJ8+7pRULKlppuu603ofPir9IMYW/1W9QxgGtfc+3GF58BVsfICv36/zU3biRYu JHKYCy15MzCzhrr5qkU0koMyM8tFV8jPntTfxXozOWZhyjhIouOoKzAev9dd3QJgjjZb vxx+6qtnmeq95FVPRG/P+a5BOn44pDw54XD20VmUIqtMpdvW371EAl9Ws89poJr62EgN 0EWYX3AzGX+Pszt6memWEmXSdXolLqRAXd3eZYAejTWaI93JBdY2Nq1QBS4+0L+F3XGM rissuQ2tdMkpJ10BwsdAWCuW6EXuXgRQc5TOuDH/JLs2JeU5iUtHIyZd6aFAmAGnGD8v Unsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w19-v6si10736179pfn.160.2018.07.24.06.06.27; Tue, 24 Jul 2018 06:06:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388363AbeGXOLY (ORCPT + 99 others); Tue, 24 Jul 2018 10:11:24 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:53692 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388279AbeGXOLY (ORCPT ); Tue, 24 Jul 2018 10:11:24 -0400 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id 845C68051E; Tue, 24 Jul 2018 15:04:58 +0200 (CEST) Date: Tue, 24 Jul 2018 15:04:57 +0200 From: Pavel Machek To: Oliver Neukum Cc: Yu Chen , "Rafael J . Wysocki" , Eric Biggers , "Lee, Chun-Yi" , Theodore Ts o , Stephan Mueller , Denis Kenzior , linux-pm@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Gu, Kookoo" , "Zhang, Rui" Subject: Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption Message-ID: <20180724130457.GB29006@amd> References: <20180718202235.GA4132@amd> <20180718235851.GA22170@sandybridge-desktop> <20180719110149.GA4679@amd> <20180719132003.GA30981@sandybridge-desktop> <20180720102532.GA20284@amd> <1532346156.3057.11.camel@suse.com> <20180723122227.GA30092@amd> <1532432981.17797.13.camel@suse.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="ghzN8eJ9Qlbqn3iT" Content-Disposition: inline In-Reply-To: <1532432981.17797.13.camel@suse.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --ghzN8eJ9Qlbqn3iT Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue 2018-07-24 13:49:41, Oliver Neukum wrote: > On Mo, 2018-07-23 at 14:22 +0200, Pavel Machek wrote: >=20 > > > Yes. But you are objecting to encryption in kernel space at all, > > > aren't you? > >=20 > > I don't particulary love the idea of doing hibernation encryption in > > the kernel, correct. > >=20 > > But we have this weird thing called secure boot, some people seem to > > want. So we may need some crypto in the kernel -- but I'd like > > something that works with uswsusp, too. Plus, it is mandatory that > > patch explains what security guarantees they want to provide against > > what kinds of attacks... >=20 > Hi, >=20 > very well, maybe we should state clearly that the goal of these > patch set is to make Secure Boot and STD coexist. Anything else > is a nice side effect, but not the primary justification, right? >=20 > And we further agree that the model of Secure Boot requires the > encryption to be done in kernel space, don't we? > Furthermore IMHO the key must also be generated in trusted code, > hence in kernel space. Yu Chen, I really cannot see how > a symmetrical encryption with a known key can be secure. Nicely said. Yes, this is the message I was trying to get across. Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --ghzN8eJ9Qlbqn3iT Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAltXI/kACgkQMOfwapXb+vJ+ewCghIg2fa7yTlSaIb0/9kAwh5kX iGkAniIMjQO7Ya9aUYd/svOSXMPHmWqt =EpGN -----END PGP SIGNATURE----- --ghzN8eJ9Qlbqn3iT--