Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp1190951pxb; Tue, 17 Aug 2021 06:07:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzcrkSq50aF2aPaJeRkpSyYQLT7KrzKxhJCD0M1+aV0Vfg0UideFZkSEFPrTDdP47kBW1DL X-Received: by 2002:a19:491b:: with SMTP id w27mr2242218lfa.421.1629205628444; Tue, 17 Aug 2021 06:07:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629205628; cv=none; d=google.com; s=arc-20160816; b=uEE7JxhBPfd4t/odRzt8lbFbJ8AqSJVP3uyB2rJMzWUMCMoxJkBWU/iC55OOedvfZP gt1OPFFW571tUNPO3GV6gNIK8wIyKTw6kvbKVYx74XSrIqTMh8wkJ4/01lTp0/yO1+Pl +kzL2FB+fARQH1MhSyhcJDVekofjQyK7yV781JNnUyevxvL6Q6EilmQUvcnpvUrCYt2x 6lrP6pPhfVWtyoCUepM85SIhpslkECj6UsD5LGBjBWi76yrO1kq7NrT4JVTxvJ8RChLA Xk8nmwxM3S2er+55HERx23ghvvmjNRusbajEMOB2ac2u0Gz47eQgmi04QZ+YtRu4WBO6 wcDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=X3xkHidA0BfGhVWp+RB1n3k+QpOUWMWJFbLwrwLW1sY=; b=XVCceRxvFu71TmhezDRYhVQ4pOS8eG/JN0At82gdPg3GETpVOcs6nJ6cw4SSmx13GC mxhILzqrji9kKr7g2P70zTasDrOf0cU2WJlAhUm9ZfxHYJdu6v29+KHElLBYo0j7AClF jrX0Z7pl4AJgZy2d8AoXLQ9o8f/tnsgGcyPDFkBfds1VNVJe6JvRmUQgs/iCU8e+kCur BHEdQeJcnh5Y1nr0PERRW9wJ79+FbTXvi0cgsfyqRTJ1HiR9FW1yzsX+rf01mLVd2dBs gIZgau8k0z05uu6u0cTesFA0OS1Ub0fwEz57h7pyjs4zfV3w4s8NjGEUDVUw3rKa6FnP YZyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l13si2218544ejg.105.2021.08.17.06.06.30; Tue, 17 Aug 2021 06:07:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237561AbhHQNFr (ORCPT + 99 others); Tue, 17 Aug 2021 09:05:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36724 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237594AbhHQNFp (ORCPT ); Tue, 17 Aug 2021 09:05:45 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AD7FBC061764 for ; Tue, 17 Aug 2021 06:05:12 -0700 (PDT) Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=[IPv6:::1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1mFymB-0006MT-9m; Tue, 17 Aug 2021 15:05:07 +0200 Subject: Re: [PATCH v2] fscrypt: support trusted keys To: Mimi Zohar , Eric Biggers , Jarkko Sakkinen Cc: "Theodore Y. Ts'o" , Jaegeuk Kim , kernel@pengutronix.de, James Morris , "Serge E. Hallyn" , James Bottomley , Sumit Garg , David Howells , linux-fscrypt@vger.kernel.org, linux-crypto@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org References: <20210806150928.27857-1-a.fatoum@pengutronix.de> <20210809094408.4iqwsx77u64usfx6@kernel.org> <20210810180636.vqwaeftv7alsodgn@kernel.org> <20210810212140.sdq5dq2wy5uaj7h7@kernel.org> <20210811001743.ofzkwdwa6rcjsf4d@kernel.org> <0e69a0aa394dd20347b06ae4e700aa17d52583ef.camel@linux.ibm.com> From: Ahmad Fatoum Message-ID: Date: Tue, 17 Aug 2021 15:04:59 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: <0e69a0aa394dd20347b06ae4e700aa17d52583ef.camel@linux.ibm.com> Content-Type: text/plain; charset=iso-8859-15 Content-Language: en-US Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: a.fatoum@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, On 12.08.21 02:54, Mimi Zohar wrote: > On Wed, 2021-08-11 at 10:16 -0700, Eric Biggers wrote: > >> Neither of you actually answered my question, which is whether the support for >> trusted keys in dm-crypt is a mistake. I think you're saying that it is? That >> would imply that fscrypt shouldn't support trusted keys, but rather encrypted >> keys -- which conflicts with Ahmad's patch which is adding support for trusted >> keys. Note that your reasoning for this is not documented at all in the >> trusted-encrypted keys documentation; it needs to be (email threads don't really >> matter), otherwise how would anyone know when/how to use this feature? > > True, but all of the trusted-encrypted key examples in the > documentation are "encrypted" type keys, encrypted/decrypted based on a > "trusted" type key. There are no examples of using the "trusted" key > type directly. Before claiming that adding "trusted" key support in > dm-crypt was a mistake, we should ask Ahmad why he felt dm-crypt needed > to directly support "trusted" type keys. I wanted to persist the dm-crypt key as a sealed blob. With encrypted keys, I would have to persist and unseal two blobs (load trusted key blob, load encrypted key blob rooted to trusted key) with no extra benefit. I thus added direct support for trusted keys. Jarkko even commented on the thread, but didn't voice objection to the approach (or agreement for that matter), so I assumed the approach is fine. I can see the utility of using a single trusted key for TPMs, but for CAAM, I see none and having an encrypted key for every trusted key just makes it more cumbersome. In v1 here, I added encrypted key support as well, but dropped it for v2, because I am not in a position to justify its use. Now that you and Eric discussed it, should I send v3 with support for both encrypted and trusted keys like with dm-crypt or how should we proceed? Cheers, Ahmad > > Mimi > > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |