Source: linux
Severity: normal
Tags: security
X-Debbugs-Cc: Debian Security Team <[email protected]>

Hi,

people claim that the crypto API is a source of security issues when 
(mis-)used by user space. LWN commenters on the recent algif_aead 
issue have some more notes:

https://lwn.net/Articles/1070682/

partial quotes:

> found only 6 packages that use it: iproute2, util-linux, bluez, 
> qtconnectivity, openssl, and ell
> [..] As far I know, the only thing that uses algif_aead is bluetooth-meshd

> Yes, it's only a small set of userspace programs that made the 
> shortsighted decision to use AF_ALG, instead of following the 
> standard practice of using a userspace crypto library.
> Help fixing these userspace programs would be greatly appreciated. 
> It would be really impactful, as it would allow more people to 
> disable CONFIG_CRYPTO_USER_API_* in their kernels.

https://lwn.net/Articles/1070960/

> it's primarily intended as an interface for some hardware crypto 
> acceleration engines (like AMD's CCP, on systems it works in 
> anyway)


So it appears there are some tradeoffs to be made. Please take a 
look and consider turning the crypto user api off.

Best,
Chris

PS: For src:util-linux, a quick look suggests we can easily stop 
using the kernels crypto API.

Reply via email to