Re: Question on loading trusted key with keyctl command

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2022-12-20 at 08:54 -0500, Mimi Zohar wrote:
> On Tue, 2022-12-20 at 07:50 -0500, James Bottomley wrote:
> > On Tue, 2022-12-20 at 12:03 +0530, Sughosh Ganu wrote:
[...]
> > > I was able to load the key after clearing the keyring. Thanks
> > > James and Mimi for your pointers.
> > 
> > Actually, I think this is a bug in trusted keys.  Add on existing
> > key is supposed to go through the update path.  If the path doesn't
> > exist it returns -EEXIST.  Trusted keys have an update path but
> > they return - EINVAL if the trusted key command is anything but
> > update (which is used to reseal a key).  Obviously this is
> > incorrect and the code should be returning -EEXIST for a key we
> > refuse to update to match every other key type.
> 
> Re-loading an existing key was previously permitted.  Obviously this
> changed at some point.   Any "fixes" should point out when it
> changed.

Git history doesn't think so.  It thinks when you added trusted keys
with d00a1c72f7f4661212299e6cb132dfa58030bcdb the update path already
had the -EINVAL return, so reload has always failed this way unless we
were doing a reseal update.  We could certainly permit overwriting an
existing key with load, but that would be a more extensive change.

James




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux