From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933444AbcALAhK (ORCPT ); Mon, 11 Jan 2016 19:37:10 -0500 Received: from mx1.redhat.com ([209.132.183.28]:39634 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758982AbcALAhI convert rfc822-to-8bit (ORCPT ); Mon, 11 Jan 2016 19:37:08 -0500 Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 From: David Howells In-Reply-To: <1452279264.2651.7.camel@linux.vnet.ibm.com> References: <1452279264.2651.7.camel@linux.vnet.ibm.com> <20160108183319.25960.49807.stgit@warthog.procyon.org.uk> To: Mimi Zohar Cc: dhowells@redhat.com, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, petkan@mip-labs.com, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 00/15] KEYS: Restrict additions to 'trusted' keyrings MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <26252.1452559026.1@warthog.procyon.org.uk> Content-Transfer-Encoding: 8BIT Date: Tue, 12 Jan 2016 00:37:06 +0000 Message-ID: <26253.1452559026@warthog.procyon.org.uk> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Mimi Zohar wrote: Mimi Zohar wrote: > > The kernel may add implicitly trusted keys to a trusted-only keyring by > > asserting KEY_ALLOC_BYPASS_RESTRICTION when the key is created, but > > otherwise the key will only be allowed to be added to the keyring if it can > > be verified. The system trusted keyring is not then special in this sense > > and other trusted keyrings can be set up that are wholly independent of > > it. > > In order to have a certificate chain of trust on any of these trusted > keyrings, the system keyring needs to be special. Even if we permit > transitive trust, meaning keys on a keyring can be used to validate > other keys being added to the same keyring, the first key added to a > trusted keyring needs to be vetted against something. That something > needs to be the builtin keys on the system keyring. Note that the KEY_ALLOC_BYPASS_RESTRICTION flag is there to permit built in keys to be added by the kernel in the first place. It would not be available to userspace to use. David