Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp368867imm; Fri, 3 Aug 2018 05:00:07 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdRYAW9b4CoU/sn+9Y3z4+JDy58URvHMZZ3suN0tUMRyH4nLHEJ53PU42WPuIDTkC9iz8vy X-Received: by 2002:a63:fa18:: with SMTP id y24-v6mr3513562pgh.362.1533297607798; Fri, 03 Aug 2018 05:00:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533297607; cv=none; d=google.com; s=arc-20160816; b=RA54LvZ+aknf2EL8XxaQBJ4XL7sV1k+jJ8x3jS77NndqlvF+a/fnXasxN9oSx7wtOL IggS0hrgLi7fa/35FuTTWNy7dW6ZYbcYs3wHwAy7Pt6LO2mgWjDS0lwFk9hMhRl20JEE f5VRr9c7F50hAJD0CyzjPbJp1H43/jZnikM8m+IDC1Nf8xFaI1ISD98zBW1v3rwnBaBP iHZIkecAfJr7O/c0gvMI4CfpcaCR8LjyG8s3Nq9xzwbWduE8Wx1kYRiqgK0sNEhfO1Hq eqyi9zBdX7W7TE0JPbZrumB2c1Mko5DNcZ+FGgns570Jo7JVKU7cnAVvPa48ZO9cLuDz xL+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=exPUK5P7emnpn1Zi8g0smX8OxMy3i2r4y8MTKXsiulY=; b=w3NM/UPFnPgRrYM7j+E5R8rviYrSBSHvzJ3JZX7V0L3tfbLEvo5IMJx2lSbA6GozzV TGerbU2KJE7WLMrKj15N1UrugUFj4f5axpNOS3wn3oQRufnHKs6Vtzvz2UXoNoYklm4z zuFxqFuEN5axA1hmDKekRLU2F3ZmBVgNJE/E4X7H13Nj7DbOEwRJEADrTyXeN7ykf45p s6oAe277Dyr+MORwc0n9fzLAsNV6yyQZmJ7zgl5UVHo3R35rSYTOw0iWHj/OLQ7YDme/ ZJlvEmaTnBBacPmToF0vprMjwuYTIlKrpBY7gq1oJnXiPY9L03qvxaXGSasj+Cu8VFgd kJeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p67-v6si4976854pfg.295.2018.08.03.04.59.52; Fri, 03 Aug 2018 05:00:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727677AbeHCNyX (ORCPT + 99 others); Fri, 3 Aug 2018 09:54:23 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:43486 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727328AbeHCNyX (ORCPT ); Fri, 3 Aug 2018 09:54:23 -0400 Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w73BsLrm054939 for ; Fri, 3 Aug 2018 07:58:22 -0400 Received: from e06smtp04.uk.ibm.com (e06smtp04.uk.ibm.com [195.75.94.100]) by mx0a-001b2d01.pphosted.com with ESMTP id 2kmm85dpu0-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 03 Aug 2018 07:58:22 -0400 Received: from localhost by e06smtp04.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 3 Aug 2018 12:58:20 +0100 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp04.uk.ibm.com (192.168.101.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 3 Aug 2018 12:58:15 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w73BwEt731588402 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 3 Aug 2018 11:58:14 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 3E439A4057; Fri, 3 Aug 2018 14:58:24 +0100 (BST) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 82C04A404D; Fri, 3 Aug 2018 14:58:22 +0100 (BST) Received: from localhost.localdomain (unknown [9.80.98.9]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 3 Aug 2018 14:58:22 +0100 (BST) Subject: Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM. From: Mimi Zohar To: David Howells , Udit Agarwal Cc: zohar@linux.vnet.ibm.com, jmorris@namei.org, serge@hallyn.com, denkenz@gmail.com, linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, sahil.malhotra@nxp.com, ruchika.gupta@nxp.com, horia.geanta@nxp.com, aymen.sghaier@nxp.com Date: Fri, 03 Aug 2018 07:58:02 -0400 In-Reply-To: <8060.1533226481@warthog.procyon.org.uk> References: <20180723111432.26830-1-udit.agarwal@nxp.com> <8060.1533226481@warthog.procyon.org.uk> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18080311-0016-0000-0000-000001F099CA X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18080311-0017-0000-0000-00003245CC6B Message-Id: <1533297482.4337.373.camel@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-03_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808030134 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2018-08-02 at 17:14 +0100, David Howells wrote: > Udit Agarwal wrote: > > > +========== > > +Secure Key > > +========== > > + > > +Secure key is the new type added to kernel key ring service. > > +Secure key is a symmetric type key of minimum length 32 bytes > > +and with maximum possible length to be 128 bytes. It is produced > > +in kernel using the CAAM crypto engine. Userspace can only see > > +the blob for the corresponding key. All the blobs are displayed > > +or loaded in hex ascii. > > To echo Mimi, this sounds suspiciously like it should have a generic > interface, not one that's specifically tied to one piece of hardware - > particularly if it's named with generic "secure". > > Can you convert this into a "symmetric" type and make the backend pluggable? TPM 1.2 didn't support symmetric keys.  For this reason, the TPM "unseals" the random number, used as a symmetric key, and returns the "unsealed" data to the kernel. Does anyone know if CAAM or TPM 2.0 have support for symmetric keys?  If they have symmetric key support, there would be no need for the symmetric key ever to leave the device in the clear.  The device would unseal/decrypt data, such as an encrypted key. The "symmetric" key type would be a generic interface for different devices. Mimi