Conversation

Jarkko Sakkinen

Anyone interested on keyring:

https://web.git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/commit/?h=keys-graveyard

If this would work out then possibly also radiate to /proc/keys.

I.e. it could also similarly "knock for reference" but that is not within scope of this patch.

#linux #kernel #keyring
1
0
0
In the case of procfs I'll check if this strategy would allow to relax locking requirements for /proc/keys.
1
0
0

@jarkko Semi-related, but I wish it were possible to have a kernel-level keyring for kernel module signing certificates so that loading into firmware isn't required for user-produced kernel modules. 😦

1
0
1
@Conan_Kudo This work is for key_put() :-) How to make it less sensitive overall.
1
0
0
@Conan_Kudo There's this irony in shared data (in general) that even if your blob lives for the whole power cycle, it must be prepared for sudden death that could happen in the next time quantum :-)
1
0
0
@Conan_Kudo BTW, so we do have machine keyring and MOK keys. What is the problem?
1
0
0

@jarkko Those have to be uploaded into UEFI firmware, and that is an unreliable situation. In addition to lacking standardized automation (hilariously you can do this with servers but not desktops), the available memory for certificates is laughably small on most systems.

It's kind of crazy that we can't do this on Linux when Windows has allowed this since they started requiring signed drivers with Windows Vista.

0
0
0