Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934068Ab2KBR5q (ORCPT ); Fri, 2 Nov 2012 13:57:46 -0400 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:41514 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932906Ab2KBR5m (ORCPT ); Fri, 2 Nov 2012 13:57:42 -0400 Message-ID: <1351879058.2439.46.camel@dabdike.int.hansenpartnership.com> Subject: Re: [RFC] Second attempt at kernel secure boot support From: James Bottomley To: Matthew Garrett Cc: Pavel Machek , Chris Friesen , Eric Paris , Jiri Kosina , Oliver Neukum , Alan Cox , Josh Boyer , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org Date: Fri, 02 Nov 2012 17:57:38 +0000 In-Reply-To: <20121102175416.GA11816@srcf.ucam.org> References: <1351762703.2391.31.camel@dabdike.int.hansenpartnership.com> <1351763954.2391.37.camel@dabdike.int.hansenpartnership.com> <20121101202701.GB20817@xo-6d-61-c0.localdomain> <5092E361.7080901@genband.com> <20121102163302.GA6080@elf.ucw.cz> <1351875164.2439.42.camel@dabdike.int.hansenpartnership.com> <20121102165456.GB9997@srcf.ucam.org> <1351878511.2439.44.camel@dabdike.int.hansenpartnership.com> <20121102175416.GA11816@srcf.ucam.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1446 Lines: 33 On Fri, 2012-11-02 at 17:54 +0000, Matthew Garrett wrote: > On Fri, Nov 02, 2012 at 05:48:31PM +0000, James Bottomley wrote: > > On Fri, 2012-11-02 at 16:54 +0000, Matthew Garrett wrote: > > > On Fri, Nov 02, 2012 at 04:52:44PM +0000, James Bottomley wrote: > > > > > > > The first question is how many compromises do you need. Without > > > > co-operation from windows, you don't get to install something in the > > > > boot system, so if you're looking for a single compromise vector, the > > > > only realistic attack is to trick the user into booting a hacked linux > > > > system from USB or DVD. > > > > > > You run a binary. It pops up a box saying "Windows needs your permission > > > to continue", just like almost every other Windows binary that's any > > > use. Done. > > > > And if all the loaders do some type of present user test on a virgin > > system, how do you propose to get that message up there? > > ? That's the message generated by the Windows access control mechanism > when you run a binary that requests elevated privileges. So that's a windows attack vector using a windows binary? I can't really see how it's relevant to the secure boot discussion then. James -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/