Re: [PATCH 0/3][RFC] Introduce the in-kernel hibernation encryption
From: Pavel Machek
Date: Mon Jun 25 2018 - 07:59:21 EST
> > Well, AFAICT in this case userland has the key and encrypted data are
> > on disk. That does not seem to be improvement.
>
> Not really.
>
> With the encryption in the kernel, if the kernel is careful enough,
> use space will not be able to read the image even if it knows the
> passphrase, unless it can also add itself to the initramfs image
> loaded by the restore kernel, which (at least) can be made way more
> difficult than simply reading the plain-text image data via an I/F
> readily provided by the kernel.
I still do not see the improvement. If you are root, you can modify
the initramfs and decrypt the data.
Please explain in the changelog how this is better than existing solution.
> >> Besides, the user space part of what you are calling uswsusp has not
> >> been actively maintained for years now and honestly I don't know how
> >> many users of it there are.
> >
> > I'd assume distros want progress bars so they still use it?
>
> I'd rather not speak for distros, but if hibernation images are
> written to fast storage, progress bars are not that useful any more.
> They are not used on Windows any more, for one.
>
> > Anyway, there's solution for encrypted hibernation.
>
> Which is suboptimal and you know it.
If this is better, please explain how in the changelog.
> > If Intel wants to invent different solution for that, and put it into kernel, they
> > should explain what the advantages are, relative to existing solution.
>
> I'm not sure what "they" is supposed to mean here, but the advantages
> are quite clear to me: better security and reduced syscall overhead.
Better security against which attack?
Syscall overhead is not a problem for hibernation, and you know it.
Pavel
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
Attachment:
signature.asc
Description: Digital signature