Inline encryption for filesystems
Inline encryption for filesystems
Posted Aug 28, 2019 13:14 UTC (Wed) by grove (guest, #1721)In reply to: Inline encryption for filesystems by markh
Parent article: Inline encryption for filesystems
For that reason (and probably a couple more) I don't expect the pure software encryption options will go away (we are too many who can see the problems in giving secret information to our hardware), but allowing others to use this feature of their hardware seems fine.
Posted Aug 28, 2019 15:02 UTC (Wed)
by iabervon (subscriber, #722)
[Link] (2 responses)
Posted Aug 29, 2019 2:35 UTC (Thu)
by ebiggers (subscriber, #130760)
[Link] (1 responses)
We could try to implement something fancy where the keyslot manager only remembers a cryptographic hash of each programmed key. But that would add extra overhead, and for now wouldn't truly buy us anything since the key still needs to be in kernel memory anyway, in case it needs to be programmed into a keyslot again.
Posted Aug 29, 2019 5:19 UTC (Thu)
by iabervon (subscriber, #722)
[Link]
Why not remember a struct key * instead of the data directly? It'd still be a pointer to the secret in kernel memory, but my impression is that they're not generally duplicated, so you could do all your management based on pointer equality, and leaking the values that have to be in your data structures to userspace would be less immediately bad.
Posted Aug 28, 2019 15:09 UTC (Wed)
by markh (subscriber, #33984)
[Link]
Inline encryption for filesystems
Inline encryption for filesystems
Inline encryption for filesystems
Inline encryption for filesystems