On Tue, Aug 10, 2021 at 09:41:20AM +0200, Ahmad Fatoum wrote: > Hello Eric, > > On 09.08.21 23:24, Eric Biggers wrote: > > Hi Ahmad, > > > > This generally looks okay, but I have some comments below. > > > > On Fri, Aug 06, 2021 at 05:09:28PM +0200, Ahmad Fatoum wrote: > >> Kernel trusted keys don't require userspace knowledge of the raw key > >> material and instead export a sealed blob, which can be persisted to > >> unencrypted storage. Userspace can then load this blob into the kernel, > >> where it's unsealed and from there on usable for kernel crypto. > > > > Please be explicit about where and how the keys get generated in this case. > > I intentionally avoided talking about this. You see, the trusted key documentation[1] > phrases it as "all keys are created in the kernel", but you consider > "'The key material is generated > within the kernel' [a] misleading claim'. [2] > > Also, I hope patches to force kernel RNG and CAAM support (using kernel RNG as > default) will soon be accepted, which would invalidate any further claims in the > commit message without a means to correct them. > > I thus restricted my commit message to the necessary bit that are needed to > understand the patch, which is: userspace knowledge of the key material is > not required. If you disagree, could you provide me the text you'd prefer? Just write that the trusted key subsystem is responsible for generating the keys. And please fix the trusted keys documentation to properly document key generation, or better yet just fix the trusted keys subsystem to generate the keys properly. > >> This is incompatible with fscrypt, where userspace is supposed to supply > >> the raw key material. For TPMs, a work around is to do key unsealing in > >> userspace, but this may not be feasible for other trusted key backends. > > > > As far as I can see, "Key unsealing in userspace" actually is the preferred way > > to implement TPM-bound encryption. So it doesn't seem fair to call it a "work > > around". > > In the context of *kernel trusted keys*, direct interaction with the TPM > outside the kernel to decrypt a kernel-encrypted blob is surely not the > preferred way. > > For TPM-bound encryption completely in userspace? Maybe. But that's not > what this patch is about. It's about kernel trusted keys and offloading > part of its functionality to userspace to _work around_ lack of kernel-side > integration is exactly that: a _work around_. As I said before, there's no need for kernel trusted keys at all in cases where the TPM userspace tools can be used. This is existing, well-documented process, e.g. see: https://wiki.archlinux.org/title/Trusted_Platform_Module. You are starting with a solution ("I'm going to use kernel trusted keys") and not a problem ("I want my fscrypt key(s) to be TPM-bound"). So please fix this patch to explain the situation(s) in which it actually solves a problem that isn't already solved. - Eric