Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp1227997ybh; Sat, 3 Aug 2019 21:06:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSAuhFRYmqpa2w4wlS3ZFR9YaWUPcUSe7IWjyuzUMr+OwWLftOFEo0rrj+5F53X3l+s1gU X-Received: by 2002:a17:902:112c:: with SMTP id d41mr127560488pla.33.1564891604867; Sat, 03 Aug 2019 21:06:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564891604; cv=none; d=google.com; s=arc-20160816; b=YQvfGINWyGUynJooDtHtkfirQeP3+dsTdKsM5HzIOh+Vb/qxGmQi8Jo9y0AC657yH0 ARtmOZt+XoUV9kk3vHnJGEtUlWuNjQv8rgm+HdV7LQb6BpUAXuqQN6VWqkUkqG1xIfdI LRLlSBQUN1F1kvkw7dcKrc8tuwNY22QwW8x0KvQ22FB+fpdVxZ1yZoZExbJmoDR9+Crk MSns2mT8pGPurSkka4bINohfn/7mT4qAboc5EBgv6yLlMJVbIbxYkrvl1zBkVzARgYR9 rccVDiZLkZBBpVugCrpFVX0YjGVDrPjTzLhSfLK3DM0jqif/fuuGKafTbYr14+k5Kn5I 2OCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=zR2bJ4cLzIyLs7NfWI8GJ0amD0i9cIYLbs36Z+U/zD0=; b=E6i97CcNUfN+VS4vAgVBiTYQdfBscY/AHdb+IsLkm8gugIL6NVPDeWIH5zUiylkYW9 HtGHDWIUxwbfizHmJI6Fim6frhCGqsNLdMSoMHjzaTkioTo+mthO1Iuc+peikGYGlo46 1/Y4yKAZ+v4BtT3AMFUzmSmQJShhRTf6UavxHy2rASb3tNnhLA1QWd0P4wbNJ7YdrXO/ WJ3Z+tguD5W6Zdeb6440sHur0dV+U+au8UI9vVYN//qwFU0Fwm4zaQk6NHfdhdmcYoTp meXviCXKHVxt4xrgPEb3yipMtrZTB0Kwv139LqjfFcQBbRVGPPb/rF5GU+vgNxojOfA1 5rkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=E2bL4sYF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s24si42134383pfh.227.2019.08.03.21.06.30; Sat, 03 Aug 2019 21:06:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=E2bL4sYF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729430AbfHDBqE (ORCPT + 99 others); Sat, 3 Aug 2019 21:46:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:45392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726150AbfHDBqE (ORCPT ); Sat, 3 Aug 2019 21:46:04 -0400 Received: from localhost.localdomain (ool-18bba523.dyn.optonline.net [24.187.165.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F253321726; Sun, 4 Aug 2019 01:46:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564883163; bh=LObcNmCTMYOwT0YqrzSQoS9DFz9YmJB/jsZ8jz9VWiw=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=E2bL4sYF6FreUCYUd9IpAVztcpoyip+1mUP3FEP3RYjJ24xUpPslMV+cTd2qyJ4MA 0huAb7ZkdApN7WG1I353p1c7oZ/SscxOtvscfIx0Cy6Tq/ZhNMOZAkXjLtx+rt/mdd btu9sLWTJWfbk7cGLxkNJbr4dTwd0Ew0vA63dfM8= Message-ID: <1564883160.11223.103.camel@kernel.org> Subject: Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated From: Mimi Zohar To: Jarkko Sakkinen , Tyler Hicks Cc: Roberto Sassu , jejb@linux.ibm.com, jgg@ziepe.ca, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, crazyt2019+lml@gmail.com, nayna@linux.vnet.ibm.com, silviu.vlasceanu@huawei.com Date: Sat, 03 Aug 2019 21:46:00 -0400 In-Reply-To: References: <20190705163735.11539-1-roberto.sassu@huawei.com> <20190711194811.rfsohbfc3a7carpa@linux.intel.com> <20190801163215.mfkagoafkxscesne@linux.intel.com> <20190802142721.GA26616@elm> <20190802194226.oiztvme5klkmw6fh@linux.intel.com> <20190802202343.GE26616@elm> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 2019-08-03 at 17:44 +0300, Jarkko Sakkinen wrote: > On Fri, 2019-08-02 at 15:23 -0500, Tyler Hicks wrote: > > That wasn't the conclusion that I came to. I prefer Robert's proposed > > change to trusted.ko. > > > > How do you propose that this be fixed in eCryptfs? > > > > Removing encrypted_key support from eCryptfs is the only way that I can > > see to fix the bug in eCryptfs. That support has been there since 2011. > > I'm not sure of the number of users that would be broken by removing > > encrypted_key support. I don't think the number is high but I can't say > > that confidently. > > Looking at the documentation [1] it is stated that > > "Encrypted keys do not depend on a TPM, and are faster, as they use AES > for encryption/decryption." > > Why would you need to remove support for encrypted keys? Isn't it a > regression in encrypted keys to hard depend on trusted keys given > what the documentation says? "Encrypted" key are symmetric keys, which are encrypted/decrypted either by a "trusted" key or, for development purposes only, a "user" key. Mimi