On Thu, Feb 03, 2005 at 03:18:20PM +0100, Fruhwirth Clemens wrote:

> Way too complicated. This is a crypto project, why does nobody think of
> crypto to solve the problem :). Here's the idea:

> [see original post, http://lkml.org/lkml/2005/2/3/109 , for idea]

Very simple patch. With that, it's really hard for root to reveal his real
keys accidentally.

Of course the intended 

dmsetup table foo > foo-table
dmsetup remove foo
dmsetup create foo foo-table 

works. If anyone is interested in that feature, this fellow has to clean the
patch and push it.

--- linux-2.6.11-rc1-mm1-therp/drivers/md/dm-crypt.c.orig       2005-02-04 
12:53:57.000000000 +0100
+++ linux-2.6.11-rc1-mm1-therp/drivers/md/dm-crypt.c    2005-02-04 
14:14:34.927560784 +0100
@@ -18,6 +18,7 @@
 #include <asm/scatterlist.h>
 #include <asm/page.h>
 
+#include <linux/random.h>
 #include "dm.h"
 
 #define PFX    "crypt: "
@@ -488,6 +489,33 @@
        queue_work(_kcryptd_workqueue, &io->work);
 }
 
+/* Trigger safety */
+
+static char *asure_dc_secret(int want_size) {
+       static char *secret = NULL;
+       static int secret_size = 0;
+
+       // FIXME: obtain some lock
+       if(secret_size < want_size) {
+               char *new_secret = kmalloc(want_size,GFP_KERNEL);
+               // FIXME malloc fail check
+               if(secret) {
+                       memcpy(new_secret, secret, secret_size);
+                       kfree(secret);
+               }
+
+               get_random_bytes(new_secret+secret_size, want_size - 
secret_size);
+               secret = new_secret; secret_size = want_size;
+       }
+       return secret;
+}
+
+static void xor_with_secret(char *p, int size) {
+       char *secret = asure_dc_secret(size);
+       while(size--)
+               *p++ ^= *secret++;
+}
+
 /*
  * Decode key from its hex representation
  */
@@ -496,9 +524,14 @@
        char buffer[3];
        char *endp;
        unsigned int i;
+       int post_process = 0;
 
        buffer[2] = '\0';
 
+       if(*hex == '!') {
+               post_process = 1;
+               hex++;
+       }
        for(i = 0; i < size; i++) {
                buffer[0] = *hex++;
                buffer[1] = *hex++;
@@ -512,6 +545,9 @@
        if (*hex != '\0')
                return -EINVAL;
 
+       if (post_process)
+               xor_with_secret(key,size);
+
        return 0;
 }
 
@@ -522,6 +558,7 @@
 {
        unsigned int i;
 
+       *hex++ = '!';
        for(i = 0; i < size; i++) {
                sprintf(hex, "%02x", *key);
                hex += 2;
@@ -689,6 +726,8 @@
        } else
                cc->iv_mode = NULL;
 
+       xor_with_secret(cc->key, cc->key_size);
+
        ti->private = cc;
        return 0;
 
@@ -899,11 +938,11 @@
                        DMEMIT("%s-%s ", cipher, chainmode);
 
                if (cc->key_size > 0) {
-                       if ((maxlen - sz) < ((cc->key_size << 1) + 1))
+                       if ((maxlen - sz) < ((cc->key_size << 1) + 2))
                                return -ENOMEM;
 
                        crypt_encode_key(result + sz, cc->key, cc->key_size);
-                       sz += cc->key_size << 1;
+                       sz += (cc->key_size << 1) + 1;
                } else {
                        if (sz >= maxlen)
                                return -ENOMEM;
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to