From: "David Härdeman" <david@2gen.com>
To: Adrian Bunk <bunk@stusta.de>
Cc: David Howells <dhowells@redhat.com>,
Christoph Hellwig <hch@infradead.org>,
linux-kernel@vger.kernel.org, keyrings@linux-nfs.org
Subject: Re: [PATCH 01/04] Add multi-precision-integer maths library
Date: Sat, 28 Jan 2006 18:09:04 +0100 [thread overview]
Message-ID: <20060128170904.GB8633@hardeman.nu> (raw)
In-Reply-To: <20060128130316.GH3777@stusta.de>
On Sat, Jan 28, 2006 at 02:03:16PM +0100, Adrian Bunk wrote:
>On Sat, Jan 28, 2006 at 11:46:11AM +0100, David Härdeman wrote:
>> On Sat, Jan 28, 2006 at 01:22:41AM +0100, Adrian Bunk wrote:
>>...
>> >If an attacker has enough privileges for attacking the daemon, he should
>> >usually also have enough privileges for attacking the kernel.
>>
>> Not necessarily, if you have your ssh-keys in ssh-agent, a compromise of
>> your account (forgot to lock the screen while going to the bathroom?
>> did the OOM-condition occur which killed the program which locks the
>> screen? remote compromise of the system? local compromise?) means that a
>> large array of attacks are possible against the daemon.
>>
>> In addition, as stated before, the "backup" account, or whatever user the
>> daemon which wants to sign stuff with your key is running as, might be
>> compromised.
>>
>> Currently, if you want to give the daemon access to the keys via
>> ssh-agent (or something similar), you have to change the permissions on
>> the ssh-agent socket to be much less restricted (especially since it's
>> unlikely that you have permission to change the uid or gid of the socket
>> to that of the daemon). Alternatively you can provide the backup daemon
>> with the key directly (via fs, or loaded somehow at startup...etc), but
>> then a compromise of the daemon means that the attacker has the private
>> key.
>>
>> Finally, the in-kernel system also provides a mechanism for the daemon
>> to request the key when it is needed should it realize that the proper
>> key is missing/has changed/whatever.
>
>
>I'm sorry, but I'm still not getting the point:
>
>Which part of this task is technically impossible to implement through a
>userspace daemon?
See my latest reply to Trond...putting the keys in the kernel makes them
as secure as they can be without having specialized hardware (e.g.
smartcards).
>> >The number of different attacks might be lower, but you haven't
>> >completely solved any problem.
>>
>> Many of the problems are unsolveable without having specialized hardware
>> (i.e. a smartcard). The fact that the dsa patch is not a panacea does
>> not mean that it can't, or that we shouldn't strive to, improve upon the
>> current situation
>
>I'm still not understanding the big improvements when doing it in the
>kernel instead of doing it in a userspace daemon.
You said it yourself above...the number of different attacks is lower
>> >>In addition, the dsa key code can be used to implement signed binaries
>> >>and signed modules.
>> >>...
>> >
>> >Checking signatures on modules sounds like a job for module-init-tools
>> >(if there's any real benefit in signing GPL'ed modules).
>>
>> No, not really, take a look at http://lwn.net/Articles/92617/ for
>> details of how signed modules could work (public key is merged into
>> kernel at build time, private key is used to build modules with embedded
>> signature, kernel checks module sigs at load-time using the embedded public
>> key, so checks can't be in module-init-tools).
>
>
>The only point in this lwn article that is not solvable outside of the
>kernel is if distributions want to prevent loading of modules they
>haven't authorized.
Ehh...how do you provide the features of signed modules in user-space?
>The lwn article outlines how distributions can use this for demanding
>money from module vendors. Distributions can do this if they want to,
>but this is nothing we should add a single byte of code for.
There are already distributions with the patch in their kernel (Fedora),
so why would they care if signed modules patches are added to the
vanilla kernel or not?
On the other hand, it does add functionality which is useful to some
users even if it is not useful to all.
Regards,
David
next prev parent reply other threads:[~2006-01-28 17:10 UTC|newest]
Thread overview: 52+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-01-26 21:58 [PATCH 00/04] Add DSA key type David Härdeman
2006-01-26 21:58 ` [PATCH 02/04] Add dsa crypto ops David Härdeman
2006-01-26 21:58 ` [PATCH 03/04] Add encryption ops to the keyctl syscall David Härdeman
2006-01-26 21:58 ` [PATCH 01/04] Add multi-precision-integer maths library David Härdeman
2006-01-27 9:28 ` Christoph Hellwig
2006-01-27 20:07 ` David Howells
2006-01-27 20:41 ` David Härdeman
2006-01-27 22:19 ` [Keyrings] " Trond Myklebust
2006-01-27 23:35 ` Kyle Moffett
2006-01-28 0:27 ` Adrian Bunk
2006-01-28 3:45 ` Trond Myklebust
2006-01-28 7:17 ` Kyle Moffett
2006-01-28 10:39 ` Adrian Bunk
2006-01-28 0:22 ` Adrian Bunk
2006-01-28 10:46 ` David Härdeman
2006-01-28 13:03 ` Adrian Bunk
2006-01-28 17:09 ` David Härdeman [this message]
2006-01-28 16:37 ` [Keyrings] " Trond Myklebust
2006-01-28 16:57 ` David Härdeman
2006-01-29 3:20 ` Trond Myklebust
2006-01-29 11:33 ` David Härdeman
2006-01-29 12:29 ` Adrian Bunk
2006-01-29 13:09 ` Arjan van de Ven
2006-01-29 20:05 ` Steve French
2006-01-29 20:52 ` Arjan van de Ven
2006-01-29 21:41 ` Steve French
2006-02-06 12:31 ` David Howells
2006-01-29 23:18 ` Adrian Bunk
2006-01-29 13:18 ` David Härdeman
2006-01-29 23:36 ` Adrian Bunk
2006-01-30 18:09 ` Nix
2006-01-29 16:38 ` Trond Myklebust
2006-01-29 18:49 ` Dax Kelson
2006-01-29 19:10 ` Trond Myklebust
2006-01-29 21:29 ` David Härdeman
2006-01-29 21:46 ` Trond Myklebust
2006-01-29 21:13 ` David Härdeman
2006-01-29 21:28 ` Trond Myklebust
2006-01-29 22:02 ` David Härdeman
2006-01-29 22:05 ` Trond Myklebust
2006-01-29 22:54 ` Kyle Moffett
2006-01-29 23:07 ` Trond Myklebust
2006-01-29 23:15 ` Adrian Bunk
2006-01-29 21:09 ` Pavel Machek
2006-01-26 21:58 ` [PATCH 04/04] Add dsa key type David Härdeman
2006-01-27 1:10 ` [PATCH 00/04] Add DSA " Herbert Xu
2006-01-27 7:18 ` David Härdeman
2006-01-27 20:11 ` David Howells
2006-01-27 23:22 ` Herbert Xu
[not found] <11380489522552@2gen.com>
2006-01-24 10:37 ` [PATCH 01/04] Add multi-precision-integer maths library David Howells
2006-01-25 20:46 ` David Härdeman
2006-01-26 9:45 ` David Howells
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20060128170904.GB8633@hardeman.nu \
--to=david@2gen.com \
--cc=bunk@stusta.de \
--cc=dhowells@redhat.com \
--cc=hch@infradead.org \
--cc=keyrings@linux-nfs.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox