[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180724144712.GV18419@linux-l9pv.suse>
Date: Tue, 24 Jul 2018 22:47:12 +0800
From: joeyli <jlee@...e.com>
To: Oliver Neukum <oneukum@...e.com>
Cc: Pavel Machek <pavel@....cz>, Yu Chen <yu.c.chen@...el.com>,
"Rafael J . Wysocki" <rafael.j.wysocki@...el.com>,
Eric Biggers <ebiggers@...gle.com>,
Theodore Ts o <tytso@....edu>,
Stephan Mueller <smueller@...onox.de>,
Denis Kenzior <denkenz@...il.com>, linux-pm@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
"Gu, Kookoo" <kookoo.gu@...el.com>,
"Zhang, Rui" <rui.zhang@...el.com>
Subject: Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation
encryption
Hi Oliver,
On Mon, Jul 23, 2018 at 01:42:36PM +0200, Oliver Neukum wrote:
> On Fr, 2018-07-20 at 12:25 +0200, Pavel Machek wrote:
> > Hi!
>
> Hello,
>
> > > Let me paste the log here:
> > >
> > > 1. (This is not to compare with uswsusp but other
> > > tools) One advantage is: Users do not have to
> > > encrypt the whole swap partition as other tools.
> >
> > Well.. encrypting the partition seems like good idea anyway.
>
> Yes, but it is a policy decision the kernel should not force.
> STD needs to work anyway.
>
> > > 2. Ideally kernel memory should be encrypted by the
> > > kernel itself. We have uswsusp to support user
> > > space hibernation, however doing the encryption
> > > in kernel space has more advantages:
> > > 2.1 Not having to transfer plain text kernel memory to
> > > user space. Per Lee, Chun-Yi, uswsusp is disabled
> > > when the kernel is locked down:
> > > https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/
> > > linux-fs.git/commit/?h=lockdown-20180410&
> > > id=8732c1663d7c0305ae01ba5a1ee4d2299b7b4612
> > > due to:
> > > "There have some functions be locked-down because
> > > there have no appropriate mechanisms to check the
> > > integrity of writing data."
> > > https://patchwork.kernel.org/patch/10476751/
> >
> > So your goal is to make hibernation compatible with kernel
> > lockdown? Do your patches provide sufficient security that hibernation
> > can be enabled with kernel lockdown?
>
> OK, maybe I am dense, but if the key comes from user space, will that
> be enough?
>
> > > 2.2 Not having to copy each page to user space
> > > one by one not in parallel, which might introduce
> > > significant amount of copy_to_user() and it might
> > > not be efficient on servers having large amount of DRAM.
> >
> > So how big speedup can be attributed by not doing copy_to_user?
>
> That would be an argument for compression in kernel space.
> Not encrpting would always be faster.
>
> > > 2.3 Distribution has requirement to do snapshot
> > > signature for verification, which can be built
> > > by leveraging this patch set.
> >
> > Signatures can be done by uswsusp, too, right?
>
> Not if you want to keep the chain of trust intact. User space
> is not signed.
Yes, any user space key helper must be authenticated for secure boot
(or the kernel locked-down mode).
If user choices the user space helper, then they should awares that
this approach can not be trusted when kernel is in locked-down mode.
The user space helper be protected by IMA/EVM, or the initrd be
authentricated with trusted boot.
The user space key helper is useful when the machine doesn't have
TPM or EFI firmware, but user still wants to use the hibernation
encryption/verification.
For kernel locked-down mode, EFI key or trusted key TPM can be
trusted because they can only be created/visibled in kernel space.
Thanks
Joey Lee
Powered by blists - more mailing lists