Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757655Ab3IAQky (ORCPT ); Sun, 1 Sep 2013 12:40:54 -0400 Received: from ka.mail.enyo.de ([87.106.162.201]:42926 "EHLO ka.mail.enyo.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753709Ab3IAQkv (ORCPT ); Sun, 1 Sep 2013 12:40:51 -0400 From: Florian Weimer To: Matthew Garrett Cc: joeyli , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org, linux-pm@vger.kernel.org, linux-crypto@vger.kernel.org, opensuse-kernel@opensuse.org, David Howells , "Rafael J. Wysocki" , Len Brown , Pavel Machek , Josh Boyer , Vojtech Pavlik , Matt Fleming , James Bottomley , Greg KH , JKosina@suse.com, Rusty Russell , Herbert Xu , "David S. Miller" , "H. Peter Anvin" , Michal Marek , Gary Lin , Vivek Goyal Subject: Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot References: <1377169317-5959-1-git-send-email-jlee@suse.com> <87eh9dzg00.fsf@mid.deneb.enyo.de> <1377734505.19568.39.camel@linux-s257.site> <87r4d8vn71.fsf@mid.deneb.enyo.de> <20130901160429.GA1375@srcf.ucam.org> Date: Sun, 01 Sep 2013 18:40:41 +0200 In-Reply-To: <20130901160429.GA1375@srcf.ucam.org> (Matthew Garrett's message of "Sun, 1 Sep 2013 17:04:29 +0100") Message-ID: <87vc2ksdfa.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1284 Lines: 27 * Matthew Garrett: > On Sun, Sep 01, 2013 at 12:41:22PM +0200, Florian Weimer wrote: > >> But if you don't generate fresh keys on every boot, the persistent >> keys are mor exposed to other UEFI applications. Correct me if I'm >> wrong, but I don't think UEFI variables are segregated between >> different UEFI applications, so if anyone gets a generic UEFI variable >> dumper (or setter) signed by the trusted key, this cryptographic >> validation of hibernate snapshots is bypassable. > > If anyone can execute arbitrary code in your UEFI environment then > you've already lost. This is not about arbitrary code execution. The problematic applications which conflict with this proposed functionality are not necessarily malicious by themselves and even potentially useful. For example, if you want to provision a bunch of machines and you have to set certain UEFI variables, it might be helpful to do so in an unattended fashion, just by booting from a USB stick with a suitable UEFI application. Is this evil? I don't think so. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/