Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp2971578rdb; Tue, 12 Sep 2023 19:30:40 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGCn9mo3xeSOEnRR27s4HNj8wR00r2YCPPtO9Mm0jZys9xuroDKG9xKmxbrWqix5OnD8orp X-Received: by 2002:a05:6358:f089:b0:142:d3dc:d3f3 with SMTP id ig9-20020a056358f08900b00142d3dcd3f3mr1421332rwb.0.1694572240005; Tue, 12 Sep 2023 19:30:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694572239; cv=none; d=google.com; s=arc-20160816; b=rz8V65z/ijbW/a+7+8rw3B7lyV5LNHWwQdKHnr8Cg0O3ujRcPJIc03Lfst+VmJWbHA IeByHr3fzIgobJKMRPHkjy4xKCw6h0/BNPN7HCPiwcOHm9dKSo9EvCfeZaUeKvZe3x+Y DTQXaxIADUVvNGTyJMSRA12rT0urYsLJ1wcvvfKjzZLdxf0X60ECKw/dMihsjZ5aDUaC wNiDewM99fB9NEkoEpseMmSbuTaU1ILYlHiuhgwiQvKv+WtFPez0mfrUfJlJbkbnrhDJ dCMR6J7qge6EIwp+M5m/rUcTNdKAJff4rSySxVLKzOLkiMMm2/7Tcx4J8F817JrHU077 IZ0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:references:to:from:subject:cc :message-id:date:content-transfer-encoding:mime-version :dkim-signature; bh=nwp2g1/24SzNu86XtJg8a2dTrtooKlsCSas8tqeOLF8=; fh=isvBvcO+0sL7rKYuWe88Ncz2hjVGIlQ56QQyLtnY8RA=; b=SBs6SvYNx6QpxiCA0Qa8IpjyKpebf+sb/oFpIx0JXduwvWTGxyCYZH91Iw7X1qLtNw +BIDUcMrUvgtpwYBRHbDBSx5KdCoYXrtaiF4kMB+uBHelHL+Igao78d2sZ0+KCZXiNWi NOR5VIc/+NFA+1aR1QRh1dgqKM78OAGhnffGzXm5VwJkSEhdtXbG+pB9JhdGqPyGojiy bzgCGqlmLKRipvsm5H7etnM8xnZ8fpAkyENYn+BMnEol0Fr/8PhGHdXGwotGPFYWAvwR 978XsAlbjQcKm4WU2iU39xox2/p+z00ij6ivFi4qxQK8GgAIiAunxE16Ez7JPyHrySTL /9VA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ueMO6ien; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id cq18-20020a056a00331200b0068e2c357ca4si9148084pfb.217.2023.09.12.19.30.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 19:30:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ueMO6ien; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id A875D821A16A; Tue, 12 Sep 2023 02:50:12 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.8 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233000AbjILJuL (ORCPT + 99 others); Tue, 12 Sep 2023 05:50:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38406 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233116AbjILJuB (ORCPT ); Tue, 12 Sep 2023 05:50:01 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 61ABBE5F; Tue, 12 Sep 2023 02:49:57 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 229BCC43395; Tue, 12 Sep 2023 09:49:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1694512196; bh=iIW7ciGWybIARozzfiRHtOz95Ez3pQ72Bb9zv5s25O4=; h=Date:Cc:Subject:From:To:References:In-Reply-To:From; b=ueMO6ienw+FxLK4joCzSYY6ODFNbmyw2ZVZS4SLV+q0gdsvP13kQPbNMeRxiYaIex R1tbQO6X4qyb1TOHjTIu8mC1/LYRzfJSV1/FnKongdVWOUbVgrEVumBuw7jiIHfVm4 5ajfx+/abCKX3IW0w2UHNVUWFp9+InyfR8w/j5CLy0I0B87ZRTqmBlcIGaq/ZIyMAD PyzPRwlIvc1DMQnL4u5vC4j9RnME2dZ7+U1vTsMJYyff3UHoUjKCB7ESPG6T8yPDa4 5IMFWYvqr9Yvxt5YO5BW5Xoj2OgibYec9P7rt77g3nUUlfiMgAHEHs0rUY5eKiM48Y W5WCiv25FzynQ== Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Tue, 12 Sep 2023 12:49:52 +0300 Message-Id: Cc: , "Mimi Zohar" , "Dmitry Kasatkin" , "Paul Moore" , "James Morris" , "Serge E. Hallyn" , , , "joeyli" , "Eric Snowberg" , "Nayna Jain" , "linuxppc-dev" Subject: Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING From: "Jarkko Sakkinen" To: =?utf-8?q?Michal_Such=C3=A1nek?= , "Nayna" X-Mailer: aerc 0.14.0 References: <20230907165224.32256-1-msuchanek@suse.de> <20230907173232.GD8826@kitsune.suse.cz> <92e23f29-1a16-54da-48d1-59186158e923@linux.vnet.ibm.com> <20230912074116.GL8826@kitsune.suse.cz> In-Reply-To: <20230912074116.GL8826@kitsune.suse.cz> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 12 Sep 2023 02:50:12 -0700 (PDT) On Tue Sep 12, 2023 at 10:41 AM EEST, Michal Such=C3=A1nek wrote: > On Mon, Sep 11, 2023 at 11:39:38PM -0400, Nayna wrote: > >=20 > > On 9/7/23 13:32, Michal Such=C3=A1nek wrote: > > > Adding more CC's from the original patch, looks like get_maintainers = is > > > not that great for this file. > > >=20 > > > On Thu, Sep 07, 2023 at 06:52:19PM +0200, Michal Suchanek wrote: > > > > No other platform needs CA_MACHINE_KEYRING, either. > > > >=20 > > > > This is policy that should be decided by the administrator, not Kco= nfig > > > > dependencies. > >=20 > > We certainly agree that flexibility is important. However, in this case= , > > this also implies that we are expecting system admins to be security > > experts. As per our understanding, CA based infrastructure(PKI) is the > > standard to be followed and not the policy decision. And we can only sp= eak > > for Power. > >=20 > > INTEGRITY_CA_MACHINE_KEYRING ensures that we always have CA signed leaf > > certs. > > And that's the problem. > > From a distribution point of view there are two types of leaf certs: > > - leaf certs signed by the distribution CA which need not be imported > because the distribution CA cert is enrolled one way or another > - user generated ad-hoc certificates that are not signed in any way, > and enrolled by the user > > The latter are vouched for by the user by enrolling the certificate, and > confirming that they really want to trust this certificate. Enrolling > user certificates is vital for usability or secure boot. Adding extra > step of creating a CA certificate stored on the same system only > complicates things with no added benefit. This all comes down to the generic fact that kernel should not proactively define what it *expects* sysadmins. CA based infrastructure like anything is a policy decision not a decision to be enforced by kernel. BR, Jarkko