Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1762392Ab2KCAuU (ORCPT ); Fri, 2 Nov 2012 20:50:20 -0400 Received: from lxorguk.ukuu.org.uk ([81.2.110.251]:37077 "EHLO lxorguk.ukuu.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756210Ab2KCAuR (ORCPT ); Fri, 2 Nov 2012 20:50:17 -0400 Date: Sat, 3 Nov 2012 00:55:04 +0000 From: Alan Cox To: Matthew Garrett Cc: Chris Friesen , "Eric W. Biederman" , James Bottomley , Eric Paris , Jiri Kosina , Oliver Neukum , Josh Boyer , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org Subject: Re: [RFC] Second attempt at kernel secure boot support Message-ID: <20121103005504.50236879@pyramind.ukuu.org.uk> In-Reply-To: <20121103002339.GD18691@srcf.ucam.org> References: <20121101212843.GA20309@srcf.ucam.org> <20121101213751.377ebaa8@pyramind.ukuu.org.uk> <20121101213452.GA20564@srcf.ucam.org> <20121101215817.79e50ec2@pyramind.ukuu.org.uk> <20121101215752.GA21154@srcf.ucam.org> <87625ogzje.fsf@xmission.com> <20121102140057.GA4668@srcf.ucam.org> <87liejacix.fsf@xmission.com> <509446FB.5000504@genband.com> <20121102234607.26cc2cbb@pyramind.ukuu.org.uk> <20121103002339.GD18691@srcf.ucam.org> X-Mailer: Claws Mail 3.8.1 (GTK+ 2.24.8; x86_64-redhat-linux-gnu) Face: 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 Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1751 Lines: 41 On Sat, 3 Nov 2012 00:23:39 +0000 Matthew Garrett wrote: > On Fri, Nov 02, 2012 at 11:46:07PM +0000, Alan Cox wrote: > > On Fri, 02 Nov 2012 16:19:39 -0600 > > Chris Friesen wrote: > > > On 11/02/2012 04:03 PM, Eric W. Biederman wrote: > > > > Matthew Garrett writes: > > > >> And if any of them are used to attack Linux, we'd expect those versions > > > >> of Windows to be blacklisted. > > > > This is the first laugh. So they revoke the key. For that to be useful > > they must propogate that into all the boxes in warehouses and all the new > > boxes. If they do that then all the existing store stock of Windows 8 DVD > > and CD media needs replacing. > > Revocation is done via Windows Update. If they refuse to do that, well, > lawyers, right? Doesn't work. Microsoft themselves have been bouncing up and down in the press about malware installed in the supply chain. They have to revoke the key in new systems as supplied. That means they can't install the Windows 8 DVD which means they can't access windows update which means all the media has to be updated. It also means all customers with rescue media and restore media would lose the ability to restore that media so those would need reissuing or a mechanism to replace them. Can't really see it happening. As any crypto systems and economics people will tell you key revocation is hard and the digital bits of it while hard are usually the tip of the iceberg. Alan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/