Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp387560pxf; Thu, 1 Apr 2021 03:58:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiz49FCIZN4whiRsCcs4xSme++4XHTp+IozphzwpcuqVku1XC++YAcfH5f7Fz8jZD4O0rg X-Received: by 2002:a17:906:4e99:: with SMTP id v25mr8426823eju.532.1617274719340; Thu, 01 Apr 2021 03:58:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617274719; cv=none; d=google.com; s=arc-20160816; b=kQCUKrm3w3Ec0Ie3HJeXGm5aOLs60BpXjaeqvavaOk98rweIMLN3yXqUuzhlQE+oIY J/AHD5EkOur3o0HOmdlMlYw2vYPBQYzbaa5DFdoiJRCqgiriU+Am8RqUVrRQ0ovIHrr5 Qv+YowvKz75jENplVw/Fbn0pytSasxGg1TIRX0yH4skyEbStxapNTqy7s1PTlsduLiJU V8tqdEwWk+Hxwcw/ZMnu85stqdtCKtpf70Q7MU8QnDZFaxUyLRi/vqv20GxgHJzKV7IY nN2V2B7OZkJOmzRk+1TlBYTyH2of80WZUaJqX0ZT6TS4Q81qMwnbupFhdU7sb5t3xZSK w9zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=EnFw7jZac5L6JpD9+e0QZnPel3SO6zkAJYzXS3NMjF8=; b=alf7rOvWTZhjOgvZpgwoiy7eqMxeCoBXBpSkk0zdk1WUGTPqjPBZF74oaVrzRWdflG fgZye1MxIzM/WH4E7iQRRJsJEa/wKjxsXDLycDfYAk0LWZVEjuAblxlfQpub3NlCg5fN yBlfdCHzDCF1jg9E21wqKsBZsbgA4ys6wnwvF37Gpm5qnD/IQ1N11Of0WB0T72KCH1p/ YwinHuZYyHEHzMvjPXnUOYdqIalVCEwtlmKRPD7tEjLnL19wTl9O72MLHbz/k8zjLo/H XGQ5DRmmeCX+XMz67VrVBIJTiHzOOgER6wrbtrEylJB+B5K/1vQC/OTDVq6jLGAE4Gpa D6Nw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id du6si4020965ejc.393.2021.04.01.03.58.15; Thu, 01 Apr 2021 03:58:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233970AbhDAK5n (ORCPT + 99 others); Thu, 1 Apr 2021 06:57:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233834AbhDAK5a (ORCPT ); Thu, 1 Apr 2021 06:57:30 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A778FC061788 for ; Thu, 1 Apr 2021 03:57:29 -0700 (PDT) Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=[IPv6:::1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1lRv0w-0007Ml-Ho; Thu, 01 Apr 2021 12:57:26 +0200 Subject: Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys To: Richard Weinberger Cc: Jarkko Sakkinen , horia geanta , Mimi Zohar , aymen sghaier , Herbert Xu , davem , James Bottomley , kernel , David Howells , James Morris , "Serge E. Hallyn" , Steffen Trumtrar , Udit Agarwal , Jan Luebbe , david , Franck Lenormand , Sumit Garg , linux-integrity , "open list, ASYMMETRIC KEYS" , Linux Crypto Mailing List , linux-kernel , LSM References: <897df7dd-83a1-3e3e-1d9f-5a1adfd5b2fb@pengutronix.de> <1263763932.139584.1617272457698.JavaMail.zimbra@nod.at> <27d7d3fa-5df8-1880-df21-200de31cc629@pengutronix.de> <717795270.139671.1617274418087.JavaMail.zimbra@nod.at> From: Ahmad Fatoum Message-ID: Date: Thu, 1 Apr 2021 12:57:22 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <717795270.139671.1617274418087.JavaMail.zimbra@nod.at> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: a.fatoum@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello Richard, On 01.04.21 12:53, Richard Weinberger wrote: > Ahmad, > > ----- Ursprüngliche Mail ----- >> Do you mean systemd-cryptsetup? It looks to me like it's just a way to supply >> the keyphrase. With trusted keys and a keyphrase unknown to userspace, this >> won't work. > > Nah, I meant existing scripts/service Files. > >> I don't (yet) see the utility of it without LUKS. Perhaps a command dump on how >> to do the same I did with dmsetup, but with cryptsetup plain instead could >> help me to see the benefits? > > My reasoning is simple, why do I need a different tool when there is already one > that could do the task too? > Usually the systems I get my hands on use already dm-crypt with cryptsetup in some way. > So I have the tooling already in my initramfs, etc.. and need to adopt the callers of cryptsetup a little. > > If I need all of a sudden different/additional tooling, it means more work, more docs to write, > more hassle with crypto/system reviewers, etc... > > I don't want you to force to use cryptsetup. I'd love to use cryptsetup with LUKS and trusted keys eventually. I'll take a look and see if cryptsetup plain maybe a suitable stop-gap solution for us. > The only goal was pointing out that it can be done with cryptsetup and that there > is already code such that no work is done twice. > One the kernel side it does not matter. Thanks for the pointer, Ahmad > > Thanks, > //richard > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |