Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5167558ybp; Mon, 14 Oct 2019 16:49:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqyMeSb0ESKa7x86Lepr/IqB/yLqYGHjDYB9Ukw4fp1g1Xjm3DfpHjG6tNOv8IFmeQCLUZbd X-Received: by 2002:a17:906:58d:: with SMTP id 13mr84132ejn.293.1571096959689; Mon, 14 Oct 2019 16:49:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571096959; cv=none; d=google.com; s=arc-20160816; b=EcI8J5cSqSRXqog3PY89gV/ukuEiIl9RCFWh+efUjhEvyFE1RxUQaAl47IXnmWu01t H78iyXM5QjdXDF4BFN2iA8dzha0mveoZa1MEumKOdjm6eRpOn60pBJJz2rv8iqeVtYhK 9gHaV7BQEMXZWfq8XedxTJX7iDTs9PZJgyboXafEstZMpfR1IVYfHd0iQIL6cSB1wxSH BmXAgfT4BT4Uye63C3l+IQgcoKrTVhKvqmOdsEcl7rq16AnImpT96yZyBR1jzPMm+c9E PglEJTgLmIWKMjGvhEInmZ7blEpu0hGXn5n4mkP665p54gUcfKyw8Z0dr4pwtZC9eonY XCEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=VDN3a+jzPzxDsAC6D94gPPo3cSOnem/dvoK6KsfdREM=; b=wgBRM3bYpkH9Lly3GfA5+NgzrnnMRFNIe/+XNLF5S8fWyRKiA5S4GyxQ2F500krL80 ztUIx0jC0dQK4IJUaa7u7QVx9dFfI9S9kX7RhZw2kraQ+gouDUDAVvHYfWCX94JT+MvP YPXFC9vz8v7bCnKNEkBpTr1ApiMWxHQB/RFRNlMiBL3gt8FiyaeOOS2voqskTqtc5HKB aASsxEyan0NyrxnOcA54WRtn5XNVN9NEA7RTUwbQU4aduRtPTqomgUJfviyk6IRtMLoU gboW8pfDsZalZ608sGTGnvUaKwy277gZimuF/sGl3+3xDyUWJ1/fTyhdrHuHnN+H63h0 DoRg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b31si14262230ede.12.2019.10.14.16.48.56; Mon, 14 Oct 2019 16:49:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387926AbfJNTL5 (ORCPT + 99 others); Mon, 14 Oct 2019 15:11:57 -0400 Received: from mga05.intel.com ([192.55.52.43]:46355 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732490AbfJNTL4 (ORCPT ); Mon, 14 Oct 2019 15:11:56 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Oct 2019 12:11:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,296,1566889200"; d="scan'208";a="395289832" Received: from kridax-mobl1.ger.corp.intel.com (HELO localhost) ([10.252.7.178]) by fmsmga005.fm.intel.com with ESMTP; 14 Oct 2019 12:11:52 -0700 Date: Mon, 14 Oct 2019 22:11:50 +0300 From: Jarkko Sakkinen To: Pascal Van Leeuwen Cc: Ken Goldman , "Safford, David (GE Global Research, US)" , Mimi Zohar , "linux-integrity@vger.kernel.org" , "stable@vger.kernel.org" , "open list:ASYMMETRIC KEYS" , "open list:CRYPTO API" , open list Subject: Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes() Message-ID: <20191014191150.GB15552@linux.intel.com> References: <20191004182711.GC6945@linux.intel.com> <20191007000520.GA17116@linux.intel.com> <59b88042-9c56-c891-f75e-7c0719eb5ff9@linux.ibm.com> <20191008234935.GA13926@linux.intel.com> <20191008235339.GB13926@linux.intel.com> <20191009073315.GA5884@linux.intel.com> <20191009074133.GA6202@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 09, 2019 at 08:09:29AM +0000, Pascal Van Leeuwen wrote: > There's certification and certification. Not all certificates are > created equally. But if it matches your specific requirements, why not. > There's a _lot_ of HW out there that's not x86 though ... > > And: is RDRAND certified for _all_ x86 processors? Or just Intel? > Or perhaps even only _specific (server) models_ of CPU's? > I also know for a fact that some older AMD processors had a broken > RDRAND implementation ... > > So the choice really should be up to the application or user. I'm not seriously suggesting to move rdrand here. I'm trying find the logic how to move forward with trusted keys with multiple backends (not only TPM). AKA we have a kernel rng in existence but no clear policy when it should be used and when not. This leads to throwing a dice with the design choices. Even it TPM RNG is the right choice in tpm_asym.c, the choice was not based on anything (otherwise it would have been documented). /Jarkko