Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp399350pxf; Thu, 1 Apr 2021 04:14:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjLJ/YTvtnS8d7TcKI/elE6iovnEPmWc82+z43ADhFp9ipwiRyHkIQvxmXyxNADswYVOSu X-Received: by 2002:a17:906:b80c:: with SMTP id dv12mr8592334ejb.110.1617275695707; Thu, 01 Apr 2021 04:14:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617275695; cv=none; d=google.com; s=arc-20160816; b=UmW46NFtzOP+K7Oh/Hy6Dv851lJcjWKRe2cPJ5HAxSe67EtnWsyhWnvt+95q4swWbz 834HpWo2eBZek/byxbafEOjP3qIXVxM+sxff+TAfeMsP8Gs+eCg0cfcwm4x5WOetiaaj Z7dlvAUHQqWhrx0N1Wi09/v6j0cXOViVFFAi2lEPRLaarx7FMnWjCYfzIWEdzsIGWNuu pbuGV99AXXfPqEleFi23W9cjDrdHV78WYVUWVhEM2qV46jDzdhzFp13LHL5/iufCLhQi /lQrrLf0OSG9sy6ftl60z3STdIZZrH9zQ7XduEQvJBlOj9U5j0rOLjYeSXSGJIkrtfpg Qgig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=I9MOkkBTjLK1m/geURqO2wv9mFLFZKuU2eBgUD2avRg=; b=QMAdMzP5CH5JdO2W4hEzabrh+wZ6vbD6JiKFuYssV2ofJpH72Xb90d93+qz9AQ0dj+ aYvLWdjyP8LI09mt+fRaN04WD6tenJWuPq3vrjKI4zDVsDtpPXSF+BMakaJz+11H3Tj4 QWpJAgdoXt3tT4Uo23nc2P04my88ZRTOQL1s2mkreD7okfXhbFaS1ThX8l2mfOUz6ZUl 48A0T5ePJRvyzaOAbWeGdGM+T4HGn2S8amAXBGq2AfZHbsqZ3xc97tQb6Us0/KTVoI20 AKK+mGyOqUtEtQyhom+NHIf83G2pGXN6zMn+Pej13vkHLbueNuS5yzHfBYCQu7WlXazF kwUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p11si3881875ejg.105.2021.04.01.04.14.32; Thu, 01 Apr 2021 04:14:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234201AbhDALN6 (ORCPT + 99 others); Thu, 1 Apr 2021 07:13:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60924 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234103AbhDALN1 (ORCPT ); Thu, 1 Apr 2021 07:13:27 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8C994C061788 for ; Thu, 1 Apr 2021 04:13:27 -0700 (PDT) Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=[IPv6:::1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1lRvGO-0001R7-F8; Thu, 01 Apr 2021 13:13:24 +0200 Subject: Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys To: Richard Weinberger Cc: Jarkko Sakkinen , horia geanta , Mimi Zohar , aymen sghaier , Herbert Xu , davem , James Bottomley , kernel , David Howells , James Morris , "Serge E. Hallyn" , Steffen Trumtrar , Udit Agarwal , Jan Luebbe , david , Franck Lenormand , Sumit Garg , linux-integrity , "open list, ASYMMETRIC KEYS" , Linux Crypto Mailing List , linux-kernel , LSM References: <897df7dd-83a1-3e3e-1d9f-5a1adfd5b2fb@pengutronix.de> <1263763932.139584.1617272457698.JavaMail.zimbra@nod.at> <27d7d3fa-5df8-1880-df21-200de31cc629@pengutronix.de> <717795270.139671.1617274418087.JavaMail.zimbra@nod.at> <1713376107.139705.1617275134320.JavaMail.zimbra@nod.at> From: Ahmad Fatoum Message-ID: <638717a5-a456-24a7-b0ab-9f71adb13687@pengutronix.de> Date: Thu, 1 Apr 2021 13:13:21 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <1713376107.139705.1617275134320.JavaMail.zimbra@nod.at> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: a.fatoum@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello Richard, On 01.04.21 13:05, Richard Weinberger wrote: > Ahmad, > > ----- Ursprüngliche Mail ----- >> Von: "Ahmad Fatoum" >>> I don't want you to force to use cryptsetup. >> >> I'd love to use cryptsetup with LUKS and trusted keys eventually. I'll take > > But using LUKS would mean that cryptsetup has access to the plain disc encryption key material? > This would be a no-go for many systems out there, key material must not accessible to userspace. > I know, distrusting userspace root is not easy, but doable. :) The LUKS2 format supports tokens. I see no reason why the encrypted blob couldn't be stored there along with the usual metadata. cryptsetup would then load it as kernel trusted key and use it for dmcrypt decryption. This will mean we have to part ways with features such as having multiple keys, but I think it's worth it to have a plug and play solution for trusted keys. Of course, someone needs to implement this first ^^. Cheers, Ahmad > > Thanks, > //richard > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |