lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20060824205419.c3894612.akpm@osdl.org>
Date:	Thu, 24 Aug 2006 20:54:19 -0700
From:	Andrew Morton <akpm@...l.org>
To:	Michael Halcrow <mhalcrow@...ibm.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 1/4] eCryptfs: Netlink functions for public key

On Thu, 24 Aug 2006 13:18:32 -0500
Michael Halcrow <mhalcrow@...ibm.com> wrote:

> eCryptfs netlink type, header updates, and messaging code to provide
> support for userspace callout to perform public key operations.
> 

That tells us (with maximum terseness) what it does.  We're left to our own
devices to work out why it does this, how it does it and why it does it in
the way in which it does it?   This leads to dumb questions ;)

- We have a great clod of key mangement code in-kernel.  Why is that not
  suitable (or growable) for public key management?

- Is it appropriate that new infrastructure for public key management be
  private to a particular fs?

- I see code in there in which the kernel "knows" about specific
  userspace processes.  By uid and pid.  What's all that doing and why is
  it done that way?

  What happens if one of these daemons exits without sending a quit message?

- It uses netlink to transport keys.  What are the security implications
  of this?  (Can they be sniffed, for example?)

- _why_ does it use netlink?

It's obvious that a string of design decisions have gone into all of this. 
Please tell us about them.  Please also tell us the answers to all the
other questions I'd have asked if I knew enough about this to ask them.


>   *   Author(s): Michael A. Halcrow <mahalcro@...ibm.com>
> + *              Trevor S. Highland <trevor.highland@...il.com>
> + *		Tyler Hicks <tyhicks@...edu>

Do we have signoffs from Trevor and Tyler?
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ