Received: by 10.213.65.68 with SMTP id h4csp124980imn; Tue, 3 Apr 2018 17:01:30 -0700 (PDT) X-Google-Smtp-Source: AIpwx48X9zN6IGdN9VCt21tmP/q+Bto6R7SBap+E4BexQTQ/RoA8/SyIQV3/AOoGBERTxVocq8tn X-Received: by 2002:a17:902:4003:: with SMTP id b3-v6mr16682171pld.15.1522800090388; Tue, 03 Apr 2018 17:01:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522800090; cv=none; d=google.com; s=arc-20160816; b=hqq1ZaCyKSqVpo1YiBnU6nj1Or9hWxB1IRywzMAEYVlKOFEePBjDwkmGpdKm6jK2Uv F2OSMHKjz8+1U0dnPmS+A0cPFT5gSqwZaXPybCA3Wl+kzHVFbwgl0iUD5JA1Sdcp727r kLtm2Lbxd/JOw+RL72aRVfwf1P3bveKwB/Zi0peju4YBE1afUbPfAqVUlI9bEoXv4iih /DHYR8riRQvN4+YE+qZkxHfSr8ytIiG4Dqjf4hqkN/vioBVS/BP+syljkkOtgnUHYFXS w/nlNNuVKvUM96hyzonqaInt2VCCxKN8DDUeqLl7v5G0hlOH9AVNPmlc1RlL6AD5N3D4 N/Zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=mj2SYH50m3d4s5thI+oY7RLl8mu5TaqRUcqy0ihwl0E=; b=wx3iOvaDVNZ8wkc5f1orT7Fd4q/JZfgSV4MeQfs1jw7Fur9y1XQ21KaW7rdmu6l3Rm +KnlTCWyZUZlALd+wLvUAFfOZZ8G7iTJ1W93LHMltfAJCIvrFzb+gfuXV3fAUGViA/AL VH5cUNz+fU36NRKzKB9FhA5AM+h7+dqWN9BoR9jgRg652NZs5qEH56YTsK/6ojRngnPF 5X6pq8cqJo8tdGwXU3sPsIjIEd4Ntvb8bvZbM2RdM5qRv/DbullOID8hyoRJtLtOtMuo C1RNzRzZZvZN4zap564wk5/hNN+S38cHT584IGNYIK5L6WIgUvJLQohdIb06m/fzKQup Exxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Sla2lLb3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11si1121946pgs.153.2018.04.03.17.01.16; Tue, 03 Apr 2018 17:01:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Sla2lLb3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755961AbeDCX74 (ORCPT + 99 others); Tue, 3 Apr 2018 19:59:56 -0400 Received: from mail-it0-f68.google.com ([209.85.214.68]:52123 "EHLO mail-it0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754092AbeDCX7v (ORCPT ); Tue, 3 Apr 2018 19:59:51 -0400 Received: by mail-it0-f68.google.com with SMTP id b5-v6so14862577itj.1 for ; Tue, 03 Apr 2018 16:59:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mj2SYH50m3d4s5thI+oY7RLl8mu5TaqRUcqy0ihwl0E=; b=Sla2lLb3zvqpqjOA+Ch52f8i73cA93uYXT9VEYPotrIkR2zVRpmu/HcsgT6gYyNp7S 4QOMlGkjIS9Z7hZkZ9YLHIkDLUC7uB4BlZkobetfMrwdAGzO1v4AoajWxTgI38aMAqQH faaJNa9xT67VyzUr1owDj7vVuHKhH7sR7xTWiOd/eaD6iKJOg+L8rLBEJbpJmnVAJgpS cCxLl7FbMLADvX4mtHmo2MZysmPegq7v8sV1QfGbXORMLtIAIsDFiNLRqF75Td3TbQTB 7vdafZcxisOCO9iKGOwZ9T7fuQqp4eCQihRc20buHAb5kob+T8AaZkvnXcDn7Itr/Ks5 628Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mj2SYH50m3d4s5thI+oY7RLl8mu5TaqRUcqy0ihwl0E=; b=G8so/wpCXYS5TlTH/zXTdiLsPYXE7WYIIWCf4ngo8P8uPQ5+L0xyO960AxK+jfDifd W2SvcUv6LIXHVkANZP+4q6I8vkdpFzCkZHfm8g4PHsmB+EQZ+SDHT0TpwwTT6jU9Oryc Bqxjp3oFhi5YNX40DQv4qI6ihkLOj9i6BCKyvOgGWI/H6ie9m3VJ4v+5am/IdGvOCSg5 rRWmFF8qSM26EgDkVmp8ydVcxN9WcMwdxet5lgPKvM+gtVGzWn4xW0GGCz5wQ/3A2+DD XLf2UwCIam8K7TnX7Jij7oNQrEXVKRuqEzEJPC5Vo3jLdud77mPWt66lfJfg+Rpnl2B8 hpPQ== X-Gm-Message-State: ALQs6tCKn6UJy9Nps8MhAcizgShwOaEOCzfbspDFiNuA+V1ZfwYomj29 OFLL9/O/7jaI39TqjRu/53C8czldcH21KlM4AFIaPA== X-Received: by 2002:a24:46cd:: with SMTP id j196-v6mr6904136itb.8.1522799990884; Tue, 03 Apr 2018 16:59:50 -0700 (PDT) MIME-Version: 1.0 References: <4136.1522452584@warthog.procyon.org.uk> <186aeb7e-1225-4bb8-3ff5-863a1cde86de@kernel.org> <30459.1522739219@warthog.procyon.org.uk> <9758.1522775763@warthog.procyon.org.uk> <13189.1522784944@warthog.procyon.org.uk> <9349.1522794769@warthog.procyon.org.uk> In-Reply-To: From: Matthew Garrett Date: Tue, 03 Apr 2018 23:59:40 +0000 Message-ID: Subject: Re: [GIT PULL] Kernel lockdown for secure boot To: Linus Torvalds Cc: luto@kernel.org, David Howells , Ard Biesheuvel , jmorris@namei.org, Alan Cox , Greg Kroah-Hartman , Linux Kernel Mailing List , jforbes@redhat.com, linux-man@vger.kernel.org, jlee@suse.com, LSM List , linux-api@vger.kernel.org, Kees Cook , linux-efi Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 3, 2018 at 4:55 PM Linus Torvalds wrote: > On Tue, Apr 3, 2018 at 4:45 PM, Matthew Garrett wrote: > >> Be honest now. It wasn't generally users who clamored for it. > > > > If you ask a user whether they want a system that lets an attacker replace > > their kernel or one that doesn't, what do you think their answer is likely > > to be? > Goddamnit. > We both know what the answer will be. > And it will have *nothing* to do with secure boot. Right, because they care about outcome rather than mechanism. Secure Boot is the mechanism we have to make that outcome possible. > > Again, what is your proposed mechanism for ensuring that off the shelf > > systems can be configured in a way that makes this possible? > If you think lockdown is a good idea, and you enabled it, then IT IS ENABLED. Ok. So we can build distribution kernels that *always* have this on, and to turn it off you have to disable Secure Boot and install a different kernel. Or we can build distribution kernels that only have this on when you're booting in a context that makes sense, and you can disable it by just disabling Secure Boot (by running mokutil --disable-validation) and not have to install a new kernel. Which outcome do you prefer?