Received: by 10.192.245.15 with SMTP id i15csp1014170imn; Sat, 10 Mar 2018 19:22:44 -0800 (PST) X-Google-Smtp-Source: AG47ELvuvcrR3qRRQlKjTWZpoAGOF3Jsh0IDv7s+EzNM2s+te75nbB/wk9KW+mNCekofxo4x01F9 X-Received: by 2002:a17:902:24c1:: with SMTP id l1-v6mr3779467plg.281.1520738564176; Sat, 10 Mar 2018 19:22:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520738564; cv=none; d=google.com; s=arc-20160816; b=la6+9V4kukxmXUN2yJLV+NVkgZatIJdkXFBD7M4Kjj7gkbgJO/Gq7MZWdLUy2cUNEF LiwB9FYtQMjMqGemgRYamJUK4ofVmILUuo4sKep6rQ47O4hU5uuuOBpZpA1+0/b++waD F4XAv0dC2hns38eDf76ZZuMzPulnnnKZWNJqAhD99AEQ13pKNzD5ZSBJ0+F/jL3ToCr4 w8WTqhhp6B/lOqnkT5Vpgj5Rz9WCBVfc+1VWnLbQ+cbMrS6RNsagR3ADC/yycG6mnde5 mkJlG2IHkQvVOID7G0XiSa1YRLXkHYmy/9QsGwAsayewJtrG20HDXqxpySCOrdmozCM4 K0uA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=LeZj+7uJnCOtVcTh9CxuIMPkTSKNxnifXO+W8ikgaSI=; b=s0D0gvYcpIBYIX4k3bcgL0wU4GNJkBj6jaVfWvS7xeHUJfP6KoHnJFZbXAv2XthX6v V3K0bJZCnfeA+eTIPg2H+2oLiTgAFaL+VOq+pE7erFe0F/Vj7swPYc0ZIDxjJ/OMxvMy QuwBC2mte4/2m/+VKvDzwozYL4+GpjQtOh6KAe05BTAXoQqZA7OTPh9p1XZ+UPYJkQAQ eNHFxOU2ITgPUgiRL1toCwzLvf+F4K83h+DkZAhhd/R0jjh+sXAz34w6KCKeTM6/Bnk5 yHryAAwwJyisC7saSgJbY/Yl7S8amr+pL1KxW/Vs2G+tCvTlKcyYMZcXsQTBWoSXgedG kc8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e61-v6si3778275plb.190.2018.03.10.19.22.30; Sat, 10 Mar 2018 19:22:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751303AbeCKDVh (ORCPT + 99 others); Sat, 10 Mar 2018 22:21:37 -0500 Received: from smtp.nue.novell.com ([195.135.221.5]:52570 "EHLO smtp.nue.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751224AbeCKDVg (ORCPT ); Sat, 10 Mar 2018 22:21:36 -0500 Received: from emea4-mta.ukb.novell.com ([10.120.13.87]) by smtp.nue.novell.com with ESMTP (TLS encrypted); Sun, 11 Mar 2018 04:21:33 +0100 Received: from linux-l9pv.suse (nwb-a10-snat.microfocus.com [10.120.13.202]) by emea4-mta.ukb.novell.com with ESMTP (TLS encrypted); Sun, 11 Mar 2018 03:20:59 +0000 Date: Sun, 11 Mar 2018 11:20:22 +0800 From: joeyli To: James Bottomley Cc: Mimi Zohar , Jiri Slaby , David Howells , keyrings@vger.kernel.org, matthew.garrett@nebula.com, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load Message-ID: <20180311032022.GA31059@linux-l9pv.suse> References: <147931984418.16460.6639993676886095760.stgit@warthog.procyon.org.uk> <6eabbb43-295e-9ba0-c0d9-120f48aa0e1d@suse.cz> <1520428682.10396.445.camel@linux.vnet.ibm.com> <1520436517.5558.2.camel@HansenPartnership.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1520436517.5558.2.camel@HansenPartnership.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 07, 2018 at 07:28:37AM -0800, James Bottomley wrote: > On Wed, 2018-03-07 at 08:18 -0500, Mimi Zohar wrote: > > On Tue, 2018-03-06 at 15:05 +0100, Jiri Slaby wrote: > > > what's the status of this please? Distributors (I checked SUSE, > > > RedHat and Ubuntu) have to carry these patches and every of them > > > have to forward-port the patches to new kernels. So are you going > > > to resend the PR to have this merged? > [...] > > Just because I trust the platform keys prior to booting the kernel, > > doesn't mean that I *want* to trust those keys once booted.  There > > are, however, places where we need access to those keys to verify a > > signature (eg. kexec kernel image). > > Which is essentially the reason I always give when these patches come > back > Josh Boyer's "MODSIGN: Allow the "db" UEFI variable to be suppressed" patch checks MokIgnoreDB variable to ignore db: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/commit/?h=keys-uefi&id=7c395b30a33a617c5cc2cdd419300af71277b79a I think that we can consider to use MokAllowDB. Which means that kernel ignores DB by default. > > Nayna Jain's "certs: define a trusted platform keyring" patch set > > introduces a new, separate keyring for these platform keys. > > Perhaps, to break the deadlock, we should ask Jiří what the reason is > the distros want these keys to be trusted.  Apart from the Microsoft > key, it will also give you an OEM key in your trusted keyring.  Is it > something to do with OEM supplied modules? > As I remember that some manufacturers uses certificate in db to sign their kernel module. We need to discuss with them for switching to mok. Currently I do not know all use cases for using db. There have some benefits for using db: - User does not need to deal with shim-mokmanager to enroll mok. Target machine doesn't need to reboot and user doesn't need to face to mokmanager UI. - The db is a authenticated variable, it's still secure when secure boot is disabled. The db is a authenticated variable that it can only be modified by manufacturer's key. Kernel can trust it when secure boot is disabled. It's useful for we do not need to taint kernel for loading a manufacturer's kernel module even secure boot is disabled. - Do not need to worry about the space of NVRAM and the EFI firmware implementation for writing a boot time variable. But I also agree that we should not trust all keys (like Microsoft key) in db by default. Thanks a lot! Joey Lee