From: Jason Gunthorpe <jgunthorpe@obsidianresearch.com>
To: David Safford <safford@watson.ibm.com>
Cc: Mimi Zohar <zohar@linux.vnet.ibm.com>,
linux-kernel@vger.kernel.org,
linux-security-module@vger.kernel.org, keyrings@linux-nfs.org,
linux-crypto@vger.kernel.org, David Howells <dhowells@redhat.com>,
James Morris <jmorris@namei.org>,
Rajiv Andrade <srajiv@linux.vnet.ibm.com>,
Mimi Zohar <zohar@us.ibm.com>
Subject: Re: [PATCH v1.2 3/4] keys: add new trusted key-type
Date: Mon, 8 Nov 2010 23:40:16 -0700 [thread overview]
Message-ID: <20101109064016.GF16307@obsidianresearch.com> (raw)
In-Reply-To: <1289240313.6060.10.camel@localhost.localdomain>
On Mon, Nov 08, 2010 at 01:18:33PM -0500, David Safford wrote:
> This is strictly for convenience in initramfs, so that the trusted
> key can be loaded and locked in a single command, with no need for
> an additional application to extend a PCR. As the the TPM driver
> already has support for extend, it's a trivial addition.
I guess I imagined that user space would want to extend some PCRs
anyhow with data from the root filesystem before handing over
control. This is not related to your patch at all, just overall how
I'd expect the TPM to be used..
It just seems like really odd functionality. I'm not familiar with the
KH api, but is there any chance now (or in future) that non-root could
access this function?
A few random observations
- I'm sure someone will say kdoc format should be used for those
function comments?
- Using a random value to extend the PCR effectively wastes it
and creates a tiny risk the random extend could result in 0.
- It would be nice to formally state the datablob is a
TPM_STORED_DATA with no embellishments. The expectation is
userspace can validate the sealInfo prior to loading the
key.
- I'm unclear on the merits of using raw random data from the TPM.
I'd feel much better if this was mixed with random
from the kernel pool too. Ideally using a FIPS DBRNG transform..
- Shouldn't all the TPM RPC functions live together in the TPM code
someplace? You've done a good job of adding many more general
primitives to build RPC's with.
FWIW, last time I worked with TPMs I built a RPC code generator
for this stuff, which if any more are added would be a really smart
direction to head in.
Cheers,
Jason
next prev parent reply other threads:[~2010-11-09 6:40 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-11-08 15:30 [PATCH v1.2 0/4] keys: trusted and encrypted keys Mimi Zohar
2010-11-08 15:30 ` [PATCH v1.2 1/4] lib: hex2bin converts ascii hexadecimal string to binary Mimi Zohar
2010-11-08 15:30 ` [PATCH v1.2 2/4] key: add tpm_send command Mimi Zohar
2010-11-08 15:30 ` [PATCH v1.2 3/4] keys: add new trusted key-type Mimi Zohar
2010-11-08 17:09 ` Jason Gunthorpe
2010-11-08 18:18 ` David Safford
2010-11-09 6:40 ` Jason Gunthorpe [this message]
2010-11-09 15:17 ` David Safford
2010-11-09 16:02 ` Roberto Sassu
2010-11-09 16:25 ` David Safford
2010-11-09 16:46 ` Roberto Sassu
2010-11-08 15:30 ` [PATCH v1.2 4/4] keys: add new key-type encrypted Mimi Zohar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20101109064016.GF16307@obsidianresearch.com \
--to=jgunthorpe@obsidianresearch.com \
--cc=dhowells@redhat.com \
--cc=jmorris@namei.org \
--cc=keyrings@linux-nfs.org \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=safford@watson.ibm.com \
--cc=srajiv@linux.vnet.ibm.com \
--cc=zohar@linux.vnet.ibm.com \
--cc=zohar@us.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox