Главная
Study mode:
on
1
Intro
2
Keys and key types
3
Keyrings: A key for organizing keys
4
The origin of keyring restrictions
5
A restricted keyring use case
6
Software versions with userspace restrictions
7
Makeup of the restrict call
8
Asymmetric Restriction Examples
9
Certificate verification
10
Additions to key types and keyrings
11
Choose a key type to use for restriction lookup
12
Implement restrict functions
13
Considerations for restrict functions
14
Implement a lookup function
15
Considerations for lookup functions
16
Other possibilities
17
Questions?
Description:
Explore the kernel keyring facility's expanded capabilities and learn how to implement keyring restrictions for userspace in this 28-minute conference talk by Mat Martineau from Intel. Dive into the evolution of the keyring facility, its generalization to support various key types, and the ability to configure restrictions from userspace. Discover how keyrings created by the keyctl API can be configured to verify signed x.509 asymmetric keys, and learn about real-world applications in the iNet Wireless Daemon (iwd) and Embedded Linux Library (ELL). Gain insights into using the keyring restriction userspace API with asymmetric keys, extending kernel key types for new userspace-configurable restrictions, and potential future developments. Cover topics such as keys and key types, keyring organization, restricted keyring use cases, software versions with userspace restrictions, and the makeup of restrict calls. Examine asymmetric restriction examples, including certificate verification, and understand the process of implementing restrict and lookup functions for key types and keyrings. Read more

Using and Implementing Keyring Restrictions for Userspace

Linux Foundation
Add to list