Re: [PATCH] xfrm: redact SA secret with lockdown confidentiality

2020-12-12 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (refs/heads/master): On Sat, 12 Dec 2020 09:57:37 +0100 you wrote: > From: Antony Antony > > redact XFRM SA secret in the netlink response to xfrm_get_sa() > or dumpall sa. > Enable lockdown, confidentiality mode, at boot or at run time. > >

[PATCH] xfrm: redact SA secret with lockdown confidentiality

2020-12-12 Thread Steffen Klassert
From: Antony Antony redact XFRM SA secret in the netlink response to xfrm_get_sa() or dumpall sa. Enable lockdown, confidentiality mode, at boot or at run time. e.g. when enabled: cat /sys/kernel/security/lockdown none integrity [confidentiality] ip xfrm state src 172.16.1.200 dst 172.16.1.100

Re: [PATCH] xfrm: redact SA secret with lockdown confidentiality

2020-11-17 Thread Antony Antony
On Sat, Oct 31, 2020 at 11:49:11 +0100, Steffen Klassert wrote: > On Fri, Oct 16, 2020 at 03:36:12PM +0200, Antony Antony wrote: > > redact XFRM SA secret in the netlink response to xfrm_get_sa() > > or dumpall sa. > > Enable this at build time and set kernel lockdown to confidentiality. > > Would

Re: [PATCH] xfrm: redact SA secret with lockdown confidentiality

2020-10-31 Thread Steffen Klassert
On Fri, Oct 16, 2020 at 03:36:12PM +0200, Antony Antony wrote: > redact XFRM SA secret in the netlink response to xfrm_get_sa() > or dumpall sa. > Enable this at build time and set kernel lockdown to confidentiality. Wouldn't it be better to enable is at boot or runtime? This defaults to 'No' at b

[PATCH] xfrm: redact SA secret with lockdown confidentiality

2020-10-16 Thread Antony Antony
redact XFRM SA secret in the netlink response to xfrm_get_sa() or dumpall sa. Enable this at build time and set kernel lockdown to confidentiality. e.g. cat /sys/kernel/security/lockdown none integrity [confidentiality] ip xfrm state src 172.16.1.200 dst 172.16.1.100 proto esp spi 0x0