Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S941396AbcKPW1x (ORCPT ); Wed, 16 Nov 2016 17:27:53 -0500 Received: from lxorguk.ukuu.org.uk ([81.2.110.251]:49670 "EHLO lxorguk.ukuu.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S938698AbcKPW1r (ORCPT ); Wed, 16 Nov 2016 17:27:47 -0500 Date: Wed, 16 Nov 2016 22:27:31 +0000 From: One Thousand Gnomes To: David Howells Cc: keyrings@vger.kernel.org, matthew.garrett@nebula.com, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 00/16] Kernel lockdown Message-ID: <20161116222731.563fb85e@lxorguk.ukuu.org.uk> In-Reply-To: <147933283664.19316.12454053022687659937.stgit@warthog.procyon.org.uk> References: <147933283664.19316.12454053022687659937.stgit@warthog.procyon.org.uk> Organization: Intel Corporation X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.31; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1023 Lines: 22 Whether it's a good idea aside You need to filter or lock down kernel module options because a lot of modules let you set the I/O port or similar (eg mmio) which means you can hack the entire machine with say the 8250 driver just by using it with an mmio of the right location to patch the secure state to zero just by getting the ability to write to the modules conf file. Without that at least fixed I don't see the point in merging this. Either we don't do it (which given the level of security the current Linux kernel provides, and also all the golden key messups from elsewhere might be the honest approach), or at least try and do the job right. Less security is better than fake security. If you've got less security your take appropriate precautions. If you rely on fake security you don't. The two other nasty cases you miss should be fine for x86 secure boot - but maybe not for secure boot in general. That is firmware loading and initial firewire state. Both should be fine on any 'secure' boot PC. Alan