Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7153207ybi; Thu, 1 Aug 2019 04:03:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOYlOygnH2dIvBoJWDPCowP1fz2OMZ5ftpbLHifNEZ0q0bJ3oE5F6iEk25nIZqMgp7++D+ X-Received: by 2002:a63:fe52:: with SMTP id x18mr118452160pgj.344.1564657379811; Thu, 01 Aug 2019 04:02:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564657379; cv=none; d=google.com; s=arc-20160816; b=eR0bh6Sz5sVfWcPD1lk9szmDgConrsg/c2oMSRwA8tjPj8GjkW0IMGMPO2u1cQqQ0K YjAXPScHbBvlUvh6LUkhUZYuFDE33jyIU4IPnQ8hgUiQt46fSnGGktf+o15MBEzhVkQj 4JAmqmBf+eUhn7GG5MZ6sHCPEgbAFa/HzwVfmTkbCVCCd3kseS2yFJme7cEcWgMzniXQ TBWnj1XUS/uqXDiT6GFmMh0DbY8q8LqBh8kvatoT89Bnp0/msVr12gh6OECz5zkcNOUk g4Y8LYnbHHf84KRF6CrPb3t4B4btHKhwiCJkyQGO+2SBxQ0SN6bw8VFk/YXv3eWZR37P Ba5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=WavWyKi8xsYiSOtxhL/Mupk8NjZ0g0ho0jTiP91yMfo=; b=b9LbgGiImZE5I/UmGvMBrGLXGuF9D5W8oHT+2ptxxDL7du4Fr7Tjr/8AmUW5aBQRCb vNxo2YtLCmkFc9lgxGFPlMLthTsc63F+MzX8rKP2WZal+79bM4zfiw/nnzLe6Laqhm5u GVk6fvnSDxVbkFAz6hySbNMX41v3diyP7v4njUTaCdsxeFwtWrvN2j9ygzyA5yAI7Hq7 zjF/LWu6W8ACUK3hlY6u57sgLpgyWCWP8eeNXcXWrDaiFAgr0GbWtbMUCP1ZRyDWxfkv vaXVfm3CXU5fqH5cpCJzVOi/GNBDOaq/4JQPF3xjfnT6wCRx3LtMe+BiT8KS30OI4efJ g7hg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ILM98uDe; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z19si35713202pfa.19.2019.08.01.04.02.43; Thu, 01 Aug 2019 04:02:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ILM98uDe; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730406AbfHAK1i (ORCPT + 99 others); Thu, 1 Aug 2019 06:27:38 -0400 Received: from mail-lf1-f65.google.com ([209.85.167.65]:36847 "EHLO mail-lf1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729796AbfHAK1i (ORCPT ); Thu, 1 Aug 2019 06:27:38 -0400 Received: by mail-lf1-f65.google.com with SMTP id q26so49875981lfc.3 for ; Thu, 01 Aug 2019 03:27:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WavWyKi8xsYiSOtxhL/Mupk8NjZ0g0ho0jTiP91yMfo=; b=ILM98uDeH4Kq4OeEe/3O0IuQ1XoT0Qrd38bGRpHpc3YusALaKFR5/NOUMP1lmLymeL uerpCmuZR0a1Ra+J73y/ObaEd3+lTlP+dZRGaqKwbJ5arq4Dpi9co1/B/neD92Q2EM9o GaJZgvDUjykVsBwgoxzGc0Yi4uiXhFR1WxNFbCKjIyWlRjAqYjRv7UpAuWRa+KOyiTSI 4ekpU/2spRg64dnda+XLs9xM5a6iUu3cw0WBJ+BV6IV+srs+pRbtYrqupbnr4gqMoCIs 3kdTbq6UX1CSHZkp7klNL5IqDWMCnxgiRV98mt9LYpxn2mukho+gu6Gs/5Qm/eJnVEHP FmBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WavWyKi8xsYiSOtxhL/Mupk8NjZ0g0ho0jTiP91yMfo=; b=r27R7HNwI/M4GD6rCCwi49EayCUrWAANFDjW9SL2zkxEzPjacO1Sm+tuqTb/lBUYoY WWT94EgkXwNxZec6TU5Kj2uPj1VQH9bwsYJL0s8fdPZvMwen1wR8nhtMyTBamkT7SRgr hujgAXeiUz8YRHL4BcHuZj/IbXb6OX/zOxvjRmEfzziAeyv3MEXbu/1WfuOlM5adaMoS CVUuNWznI+KC+jrodN3E7h+y++zZ/iN5xxWC5HFrVwEc4Z5bWuyW2T2vLJva5rFxPkAU WLUrpFw8tsUU5P1SqV2lhpRw/kLFuXZQQtiq4HDag8R6i0z32cN8BRtmLT5llBypm9Ou f6Ug== X-Gm-Message-State: APjAAAXHIE7MHqX7DEea7DrSbVcDdw/U06EZHSxywHDrm1Fq931iT8cM htgbtp7CazRXnkFXOPot4NB3iP/eMmcoIv9oOFcnEQ== X-Received: by 2002:ac2:5094:: with SMTP id f20mr63091641lfm.186.1564655256560; Thu, 01 Aug 2019 03:27:36 -0700 (PDT) MIME-Version: 1.0 References: <1564489420-677-1-git-send-email-sumit.garg@linaro.org> <19d9be198619e951750dedeb4d0a7f372083b42c.camel@pengutronix.de> In-Reply-To: From: Sumit Garg Date: Thu, 1 Aug 2019 15:57:25 +0530 Message-ID: Subject: Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support To: Janne Karhunen Cc: Rouven Czerwinski , "tee-dev @ lists . linaro . org" , Daniel Thompson , Jonathan Corbet , jejb@linux.ibm.com, Ard Biesheuvel , Linux Doc Mailing List , Jarkko Sakkinen , Linux Kernel Mailing List , dhowells@redhat.com, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, Mimi Zohar , Casey Schaufler , linux-integrity@vger.kernel.org, linux-arm-kernel , "Serge E. Hallyn" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 1 Aug 2019 at 14:00, Janne Karhunen wrote: > > On Thu, Aug 1, 2019 at 10:58 AM Sumit Garg wrote: > > > > Anyway, just my .02c. I guess having any new support in the kernel for > > > new trust sources is good and improvement from the current state. I > > > can certainly make my stuff work with your setup as well, what ever > > > people think is the best. > > > > Yes your implementation can very well fit under trusted keys > > abstraction framework without creating a new keytype: "ext-trusted". > > The fundamental problem with the 'standardized kernel tee' still > exists - it will never be generic in real life. Getting all this in > the kernel will solve your problem and sell this particular product, > but it is quite unlikely to help that many users. If the security is > truly important to you, would you really trust any of this code to > someone else? In this day and age, I really doubt many do. There are already multiple platforms supported by OP-TEE [1] which could benefit from this trusted keys interface. > Everyone > does their own thing, so this is why I really see all that as a > userspace problem. > IMO, we should try to use standardized interfaces which are well thought off rather than implementing your own. [1] https://optee.readthedocs.io/general/platforms.html -Sumit > > -- > Janne