[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1289315838.16976.38.camel@localhost.localdomain>
Date: Tue, 09 Nov 2010 10:17:18 -0500
From: David Safford <safford@...son.ibm.com>
To: Jason Gunthorpe <jgunthorpe@...idianresearch.com>
Cc: Mimi Zohar <zohar@...ux.vnet.ibm.com>,
linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org, keyrings@...ux-nfs.org,
linux-crypto@...r.kernel.org, David Howells <dhowells@...hat.com>,
James Morris <jmorris@...ei.org>,
Rajiv Andrade <srajiv@...ux.vnet.ibm.com>,
Mimi Zohar <zohar@...ibm.com>
Subject: Re: [PATCH v1.2 3/4] keys: add new trusted key-type
On Mon, 2010-11-08 at 23:40 -0700, Jason Gunthorpe wrote:
> It just seems like really odd functionality. I'm not familiar with the
> KH api, but is there any chance now (or in future) that non-root could
> access this function?
good point - we really should explicitly require CAP_SYS_ADMIN for
pcrlock to be safe. Willdo.
> A few random observations
> - I'm sure someone will say kdoc format should be used for those
> function comments?
that's not required for static functions.
> - Using a random value to extend the PCR effectively wastes it
> and creates a tiny risk the random extend could result in 0.
2^-160? And using a fixed value, or one under user control
would be worse.
> - It would be nice to formally state the datablob is a
> TPM_STORED_DATA with no embellishments. The expectation is
> userspace can validate the sealInfo prior to loading the
> key.
It's not obvious from the code? :-) Will clarify in comments.
(It also needs to be documented somewhere in some userspace
documentation. We will be posting trusted key userspace utilities
(such as for generating/inspecting pcrinfo blobs and fields in
sealed blobs), and will certainly document it there too. Perhaps
the trusted keys information should be added to keyctl or a new
man page too?)
> - I'm unclear on the merits of using raw random data from the TPM.
> I'd feel much better if this was mixed with random
> from the kernel pool too. Ideally using a FIPS DBRNG transform..
The TPM's have a FIPS certified random number generator, which must
pass a power-on self test before it is used. I have done extensive
DieHard tests on various TPM chips, and they have all passed, showing
in my tests unmeasurable correlation. Particularly at boot time, I
trust the TPM random numbers more than the kernel pool, which has
not yet been reseeded or had time to accumulate much entropy.
> - Shouldn't all the TPM RPC functions live together in the TPM code
> someplace? You've done a good job of adding many more general
> primitives to build RPC's with.
> FWIW, last time I worked with TPMs I built a RPC code generator
> for this stuff, which if any more are added would be a really smart
> direction to head in.
The seal and unseal are now pretty general, and could be moved to
the TPM code, but unless there are other kernel users of the functions,
they might as well stay static and with the trusted key code, since
that's the only place they are being used. Easy enough to move and
make public later if someone wants them...
dave
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists