All of lore.kernel.org
 help / color / mirror / Atom feed
From: Milan Broz <mbroz@redhat.com>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] unlocking dm-crypt from grub - kernel in crypted volume
Date: Wed, 24 Aug 2011 09:51:07 +0200	[thread overview]
Message-ID: <4E54AD6B.3070300@redhat.com> (raw)
In-Reply-To: <20110823130508.GB21623@tansi.org>

On 08/23/2011 03:05 PM, Arno Wagner wrote:
> 
> Quite frankly, I doubt this increses security significantly.

>> For example passing the password in a safe way from grub to the kernel

IMHO without full implementation of "trusted boot" this will
just add some small amount of work for attacker without
real security increase.
And with "trusted boot" (whatever it means) grub loader integrity
should be verified before you enter passphrase.

In fact, it is just few instruction to add to grub module
to store entered passphrase somewhere on disk, CMOS, flash,
whatever is available for later use by attacker.
(Just another variation to "Evil maid" attack.)

Anyway, LUKS implementation in GRUB2 is completely independent
from upstream, so you can ask on grub devel list - they did not
tried to contact upstream if there is possibility
to share some code, so it contains full LUKS reimplementation
(but it is good for other reasons, though).

For kernel dm-crypt - I really do not want here things
like "encrypted passphrase" or similar concepts.
(Until some certification process forces me:-)

But I would like to add here concept of "passphrase handle"
IOW userspace will just hand over handle (id)
to some other subsystem where the key is stored
(Could be kernel keyring, some token, whatever).

Milan

  parent reply	other threads:[~2011-08-24  7:51 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-08-23  9:14 [dm-crypt] unlocking dm-crypt from grub - kernel in crypted volume Olivier Sessink
2011-08-23 13:05 ` Arno Wagner
2011-08-23 20:52   ` Olivier Sessink
2011-08-24  7:51   ` Milan Broz [this message]
2011-08-24  7:58     ` Yves-Alexis Perez

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4E54AD6B.3070300@redhat.com \
    --to=mbroz@redhat.com \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.