Received: by 10.213.65.68 with SMTP id h4csp1550416imn; Mon, 19 Mar 2018 07:13:44 -0700 (PDT) X-Google-Smtp-Source: AG47ELt61GoqzWW5MO9HIzaJjB8pCrJb/hpV1ZXErWE5njElUyB6QK7YCDhUc+KJxzoSN68KUiLb X-Received: by 2002:a17:902:b943:: with SMTP id h3-v6mr12641786pls.1.1521468823963; Mon, 19 Mar 2018 07:13:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521468823; cv=none; d=google.com; s=arc-20160816; b=YXN7MJwDUTMdLi162AWZ5otj8XBNkHnVn2YMk/LPDVRgQnvn45yCL0Rd8D0C54O4ae vqgVtLWofmNYSJX/w57CpB0aVrv30T5KVZjLjZ5y6dVTRAnqDWg/wQuSDW3zkNOiO2DB 7OIhCA1cS+YLA3iybc8Jx762OesAdqaNfFeLhuvINPzwHpjT/wMoIfw1tRpJfQWYFTvP uB9Al5n1LASdG0KHcy9S1+vQ+JhXrJDFyikzyXf8bzysjokBYQc1acHv16qCM0G70lS9 +TnJiCCp9rcwsRtVqEuxJhWTjhy6B2QciRFpBZY8WKPw3X267KkayBZC9VPUFK9cLdEq x9NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=1UNNUDXOcaBWaNlX7boDLXVGDiuPJYs6iSxhbyxIBTs=; b=dASbqb3b1M5o7n741/n3t89d6GvuCYrIjJCt0Lr+QzX+Hee/pr+kjaI1eSIJHFRAgR Q5IHhSeiwWM1m76aX018BxxWRm5qDCON1svqzMO5lGeMi+p+eMvN/FK2hc78KKqUljPw pX/14HwKEt0TJ51b/ljPZXkFhIDJPonE7dmB3Kq+1vPe7vNQu+B8RLVogZy5wcJcqo7Q N6oKSN6/KJljHKXznKN7UWfD0ZYZNESDJiU9edZWJZQ1lczQ2v0gGCozIGvME9wpOtgG L+ZzWIR5KHFJXFWjWc/qlWutU1dCTr1zWhOEuiqkyQvDibdkzSkgq26j5yfDQsguAxB7 6iXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w24-v6si48902pll.85.2018.03.19.07.13.27; Mon, 19 Mar 2018 07:13:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755610AbeCSOMR (ORCPT + 99 others); Mon, 19 Mar 2018 10:12:17 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:33632 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755299AbeCSOMN (ORCPT ); Mon, 19 Mar 2018 10:12:13 -0400 Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w2JEBnHE099980 for ; Mon, 19 Mar 2018 10:12:12 -0400 Received: from e06smtp10.uk.ibm.com (e06smtp10.uk.ibm.com [195.75.94.106]) by mx0b-001b2d01.pphosted.com with ESMTP id 2gtern00e4-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Mon, 19 Mar 2018 10:12:11 -0400 Received: from localhost by e06smtp10.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 19 Mar 2018 14:12:09 -0000 Received: from b06cxnps3074.portsmouth.uk.ibm.com (9.149.109.194) by e06smtp10.uk.ibm.com (192.168.101.140) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Mon, 19 Mar 2018 14:12:06 -0000 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w2JEC5A166060306; Mon, 19 Mar 2018 14:12:05 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2EF1911C064; Mon, 19 Mar 2018 14:04:38 +0000 (GMT) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 140B011C070; Mon, 19 Mar 2018 14:04:37 +0000 (GMT) Received: from localhost.localdomain (unknown [9.80.82.212]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Mon, 19 Mar 2018 14:04:36 +0000 (GMT) Subject: Re: [PATCH 0/9] KEYS: Blacklisting & UEFI database load From: Mimi Zohar To: joeyli , James Bottomley Cc: Jiri Slaby , David Howells , keyrings@vger.kernel.org, matthew.garrett@nebula.com, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org Date: Mon, 19 Mar 2018 10:12:03 -0400 In-Reply-To: <20180311032022.GA31059@linux-l9pv.suse> References: <147931984418.16460.6639993676886095760.stgit@warthog.procyon.org.uk> <6eabbb43-295e-9ba0-c0d9-120f48aa0e1d@suse.cz> <1520428682.10396.445.camel@linux.vnet.ibm.com> <1520436517.5558.2.camel@HansenPartnership.com> <20180311032022.GA31059@linux-l9pv.suse> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18031914-0040-0000-0000-00000422DB0D X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18031914-0041-0000-0000-00002625F0A7 Message-Id: <1521468723.3503.171.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-03-19_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1803190164 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 2018-03-11 at 11:20 +0800, joeyli wrote: > On Wed, Mar 07, 2018 at 07:28:37AM -0800, James Bottomley wrote: > > On Wed, 2018-03-07 at 08:18 -0500, Mimi Zohar wrote: > > > On Tue, 2018-03-06 at 15:05 +0100, Jiri Slaby wrote: > > > > what's the status of this please? Distributors (I checked SUSE, > > > > RedHat and Ubuntu) have to carry these patches and every of them > > > > have to forward-port the patches to new kernels. So are you going > > > > to resend the PR to have this merged? > > [...] > > > Just because I trust the platform keys prior to booting the kernel, > > > doesn't mean that I *want* to trust those keys once booted.  There > > > are, however, places where we need access to those keys to verify a > > > signature (eg. kexec kernel image). > > > > Which is essentially the reason I always give when these patches come > > back > > > > Josh Boyer's "MODSIGN: Allow the "db" UEFI variable to be suppressed" > patch checks MokIgnoreDB variable to ignore db: > > https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/commit/?h=keys-uefi&id=7c395b30a33a617c5cc2cdd419300af71277b79a > > I think that we can consider to use MokAllowDB. Which means that kernel > ignores DB by default. Not all systems have a shim layer.  This design is really x86 specific.  Allowing shim keys, but ignoring DB, does not address those systems. > > > Nayna Jain's "certs: define a trusted platform keyring" patch set > > > introduces a new, separate keyring for these platform keys. > > > > Perhaps, to break the deadlock, we should ask Jiří what the reason is > > the distros want these keys to be trusted.  Apart from the Microsoft > > key, it will also give you an OEM key in your trusted keyring.  Is it > > something to do with OEM supplied modules? > > > > As I remember that some manufacturers uses certificate in db to > sign their kernel module. We need to discuss with them for switching > to mok. Currently I do not know all use cases for using db. > > There have some benefits for using db: > > - User does not need to deal with shim-mokmanager to enroll mok. > Target machine doesn't need to reboot and user doesn't need to > face to mokmanager UI. The reason for trusting enrolled shim keys is because it requires physical presence.  (I kind of remember hearing that this changed.  There is some method of accepting enrolled keys that does not require physical presence.) > - The db is a authenticated variable, it's still secure when secure > boot is disabled. > The db is a authenticated variable that it can only be modified > by manufacturer's key. Kernel can trust it when secure boot > is disabled. It's useful for we do not need to taint kernel > for loading a manufacturer's kernel module even secure boot is > disabled. > > - Do not need to worry about the space of NVRAM and the EFI firmware > implementation for writing a boot time variable. > > But I also agree that we should not trust all keys (like Microsoft key) > in db by default. Between requiring a shim layer and relying on physical presence, I'm not convinced this is the best solution.  Do we really want to support different methods for different architectures? Mimi