Received: by 10.213.65.68 with SMTP id h4csp939318imn; Wed, 4 Apr 2018 09:44:19 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+uQQG+2g4W8MBFVrS2dm/ga3Vssaws7uh8khBOQFj2e2wWH8UZ0Bogsb7mvRVnUn78oM6m X-Received: by 2002:a17:902:aa95:: with SMTP id d21-v6mr10597682plr.66.1522860259365; Wed, 04 Apr 2018 09:44:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522860259; cv=none; d=google.com; s=arc-20160816; b=wznbeMBbmi/MwzjrWBh2Fk5vu3D2R/f6bxygYlVlgJOXkNzcB2qi2ywhJBAq81ybC2 oh8GQT4qbdwxwV9Sb3pQeICj0pA4T0vdQlFYCBaa/WtDnW3bt/gpF1moOk2I+3cBNus3 KqeCrUsaNae36OGuV33FarCg9pX0nC9jEOb9AtcDJV7jnacmS5Tc+tfDg8gkIAjwVC9T d0CDBECFx60LGafHpis9HXWJVsIAfYqqSLYBdGAtnC8nZl+MCs1wPrAxfkD9Fp1jJqbQ QQ/ryoi+cAoAyzMTBtguul8is3l86cvf1K9Sxzm3eHUMgZZBh5m5ZYv8nXQ4vVnoIDTV rz1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=qwU3UkXiM28SH4+2I6SWAy+MyXAvw8bRzM345bOybCs=; b=pJFleiGqZGZm5bWNeo7xBqnPef5uqpNXnn31wcpGNzwVQ8ZdFxvRlbiHIvItPkxZGT 6sOMoM8NU0pHi//D9Zxey+wDc0R9SGPBg/SH3GYE/GUrueaoqkDKLfcxyCZZ4xxFRp7Y bauDUv3YFzRlE3cF2edwu1iBuEddFvPGWslWMo5mcsEom8bN+7xbzkhdOTVlqUgrpl7G 7CTq5EgJfYMIRdvW4eLiwra/eP2tq2Tf0RgnsH6Ty9m0DaBfUlKhMl27atfsD9+/oywp 2tL6tpYoDMRTtCZ4hRnq9bf03YrHTpFK2VXZEqI8kuWOcaS1RgmwIHOJYAOv/x5Y3+rM l26Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JYiXRiA3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n2si3924285pgs.500.2018.04.04.09.44.05; Wed, 04 Apr 2018 09:44:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JYiXRiA3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752348AbeDDQmf (ORCPT + 99 others); Wed, 4 Apr 2018 12:42:35 -0400 Received: from mail-it0-f67.google.com ([209.85.214.67]:54338 "EHLO mail-it0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752089AbeDDQmc (ORCPT ); Wed, 4 Apr 2018 12:42:32 -0400 Received: by mail-it0-f67.google.com with SMTP id h143-v6so29000562ita.4 for ; Wed, 04 Apr 2018 09:42:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qwU3UkXiM28SH4+2I6SWAy+MyXAvw8bRzM345bOybCs=; b=JYiXRiA3t/TLQtd5OgnCzYSLfM+M9OJgIwIExQjCGF6ZR0zmARsJsGzgZuyRJerWbC mrAT/IlzmrCGJlvX1uqPOSjPGQbUG+PYupoBPuVR+wtAtm7IclMQ2Old93QG4HFZLpdu rsilGy5MiHDLtARmVlRazJRqdqVRzMEPkmKTB3E/GdZvM1qWqG1G7pD6di80eHTyNfL1 5j19dcf1TwUdvNCri+MRXif2nyaw3zRlAwTcKsejksJ5YSEbj3tqmwFMLJ5Jo4Qon0XN XA0Y42wbzS6Xgc8jL/j2OUfCt7hG6isJbBLQ4nYECSX5inlmoSDN1qktnl6QMSxVZEtD +lig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qwU3UkXiM28SH4+2I6SWAy+MyXAvw8bRzM345bOybCs=; b=gyErC9kIm87Dk/YIO4C7EKTYfam1PqYQDKzjH9FezrAaEjhZ96pLuxlcADybP2kfz2 BWKqYZ7IZnH32HMHUN1mj/VhQTNQ0Vi71zqry3BAoHLTsyLzHbuVoQdVuzpxqwiBhQ5X tYs3MTYiQVVNgqO33126T/qJzvSpHdRSnmavXY7Ts7w+t6D/oJHY1daj7QIKkEwCa87Y RPXUSt6ldd4gEI/O9vdeOAmUkNC67Q61S0tZdVu0gA3v8+piEofP/7Y6AxnNc0qjtqC+ L/unrpUYGi0Dsr3NRtAhieFM/p+Hte+wRENBBGk/WrieqrPpVt2rj+tzvJwSRmF9XV3B A+ow== X-Gm-Message-State: ALQs6tBgFwxP3h27mt4b6bii+Tee4uNSqYLulgZbbyj2EVGByhpAR0w+ GcNcM6P+cYEHqY79vlCdyjUCX/5mFJYQitOZQYxK1g== X-Received: by 2002:a24:6881:: with SMTP id v123-v6mr10618012itb.32.1522860151132; Wed, 04 Apr 2018 09:42:31 -0700 (PDT) MIME-Version: 1.0 References: <24353.1522848817@warthog.procyon.org.uk> <20180404135251.GD16242@thunk.org> In-Reply-To: From: Matthew Garrett Date: Wed, 04 Apr 2018 16:42:20 +0000 Message-ID: Subject: Re: [GIT PULL] Kernel lockdown for secure boot To: luto@kernel.org Cc: tytso@mit.edu, David Howells , Linus Torvalds , Ard Biesheuvel , jmorris@namei.org, Alan Cox , Greg Kroah-Hartman , Linux Kernel Mailing List , jforbes@redhat.com, linux-man@vger.kernel.org, jlee@suse.com, LSM List , linux-api@vger.kernel.org, Kees Cook , linux-efi Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 4, 2018 at 9:39 AM Andy Lutomirski wrote: > On Wed, Apr 4, 2018 at 9:22 AM, Matthew Garrett wrote: > > If you don't have secure boot then an attacker with root can modify your > > bootloader or kernel, and on next boot lockdown can be silently disabled. > This has been rebutted over and over and over. Secure boot is not the > only verified boot mechanism in the world. Other, better, much more > auditable, and much simpler mechanisms have been around for a long, > long time. Right and if you *know* that you're in that situation then you either turn it on in bootparams from the verified bootloader (which we can't do in UEFI because the *firmware* can be the bootloader thanks to the EFI boot stub) or you enable it from userland later (I can't remember if this version of the patchset provides that functionality, but a previous one did). > > Which is why Shim allows you to disable validation if you prove physical > > user presence. > And that's a giant hack. The actual feature should be that a user > proves physical presence and thus disables lockdown *without* > disabling verification. That's a completely reasonable feature request.