[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180605211238.GH7839@thunk.org>
Date: Tue, 5 Jun 2018 17:12:38 -0400
From: "Theodore Y. Ts'o" <tytso@....edu>
To: Richard Weinberger <richard@...ma-star.at>
Cc: Richard Weinberger <richard.weinberger@...il.com>,
Linus Torvalds <torvalds@...ux-foundation.org>,
LKML <linux-kernel@...r.kernel.org>,
linux-fscrypt@...r.kernel.org
Subject: Re: [GIT PULL] fscrypt updates for 4.18
On Tue, Jun 05, 2018 at 07:05:52PM +0200, Richard Weinberger wrote:
> > An attack scenario where someone manages to downgrade the crypto of
> > your phone would require replacing your kernel and your /system
> > partition --- at which point, you've got other problems. :-)
>
> This means Speck is never enabled at kernel level on non-cheap phones?
No. And even if it were, the /system partition is going to request
that the kernel encrypt files using one and only encryption algorithm:
namely, AES.
Things aren't as configurable on an Android phone as you might be used
to on a laptop. Some manufacturers use ext4; some manufacturers
decide they want to use f2fs. They make that decision not you, and
only the file system utilities for that one file system are compiled
into the system.
Similarly, you don't get to choose what crypto algorithm you use;
that's decided for you by the manufacturer. Which is good; it's one
less thing that hte attacker can spoof, and one less thing for users
to potentially get wrong.
- Ted
Powered by blists - more mailing lists