Received: by 10.213.65.68 with SMTP id h4csp2038861imn; Thu, 5 Apr 2018 08:00:50 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/tg4wnhbjSRKahbeHNL4g44Sgi9VAVG1fnCL7LFMCloo7r1m+EzcIXDphdOXIa33iV519F X-Received: by 10.98.152.22 with SMTP id q22mr17462482pfd.178.1522940450005; Thu, 05 Apr 2018 08:00:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522940449; cv=none; d=google.com; s=arc-20160816; b=qyJMGBMW0m+RDPp8Y1v2ZV4aBwN3BB6bb4wPPpQczK8Cblwzu11kHXgTZwqdAc4h9/ uVCs3bGHfk3SVG1BaLfeyEiKow9nlbtXk0QWZKd5zABedr+5Y9h87JEeDSQaCUOqaycb dQL6oBVC1fyPQWsnT/RGRbO/NcPmAqJiPwN5YtyD1cerfhTnZOuToacBOHPbiwStbhfK oBh8bfHP4C9tcLtbUWiux7rA+voa7T9ITkb+S2V8KZLIHglQnexRYw5Za++BVwS4NV7X hHiDS3ptzbAcb0qzrm06sc3EO/6DX9ruyGzl1vqAzCm9wHO9JnjtrDhZ7McTpeik7xc/ GhUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=fNIw3aw6Y+1hxa12naG68dtcGRrgdWdTD+Ylt+iAxwE=; b=QNLx1wxn783YYZjPVAzlpHR69rl8njVflTRs7aNHYuuS2pJnx8H1KZ/OfzZcIT8fn4 WM4kQLCcBoNKSH85gilaWcNwErfZHZAfCDVwDpLi5KE4Jqs8ZK+R9deA0SYDGSFtCglk yPm7ebWZ9QNaVKXFDY56US+JGIqfNFxUKrEnNMK/1lB2GuAy5yzMmmShncVEG872dA9v hYFEsRkQnHn87GPoeJMp1crKsmsxwbyaFl8q3q/1aDLMYH8V3r4z3KFYod6DP6EEcT/K ql162fRVtUSASPPeF2mJqnOvOvh0g1AAtxtHsMa7TrH8WKTdZNziqvPSVj1SU0aMtBsn BMwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3-v6si6102301plf.446.2018.04.05.08.00.35; Thu, 05 Apr 2018 08:00:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751532AbeDEO6z (ORCPT + 99 others); Thu, 5 Apr 2018 10:58:55 -0400 Received: from www.llwyncelyn.cymru ([82.70.14.225]:50772 "EHLO fuzix.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751277AbeDEO6x (ORCPT ); Thu, 5 Apr 2018 10:58:53 -0400 Received: from alans-desktop (82-70-14-226.dsl.in-addr.zen.co.uk [82.70.14.226]) by fuzix.org (8.15.2/8.15.2) with ESMTP id w35EwQQ9014302; Thu, 5 Apr 2018 15:58:26 +0100 Date: Thu, 5 Apr 2018 15:58:25 +0100 From: Alan Cox To: Matthew Garrett Cc: Linus Torvalds , luto@kernel.org, David Howells , Ard Biesheuvel , jmorris@namei.org, Greg Kroah-Hartman , Linux Kernel Mailing List , jforbes@redhat.com, linux-man@vger.kernel.org, jlee@suse.com, LSM List , linux-api@vger.kernel.org, Kees Cook , linux-efi Subject: Re: [GIT PULL] Kernel lockdown for secure boot Message-ID: <20180405155825.588b2775@alans-desktop> In-Reply-To: References: <4136.1522452584@warthog.procyon.org.uk> <9349.1522794769@warthog.procyon.org.uk> Organization: Intel Corporation X-Mailer: Claws Mail 3.15.1-dirty (GTK+ 2.24.31; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 04 Apr 2018 00:12:04 +0000 Matthew Garrett wrote: > On Tue, Apr 3, 2018 at 5:08 PM Linus Torvalds > > wrote: > > Still better than telling them to disable/enable secure boot, which > > they may or may not even be able to to. > > Users who can boot a non-vendor Linux distribution on their platform can > disable Secure Boot 100% of the time. So can anyone else, or ignore it. Vendors of all OS's have released enough buggy but signed kernel images over the past years that rummaging around in the archive will find you a wide choice of signed boot images that'll then let you do wtf you like including chaining some other target. It was IMHO broken by design, it's always been broken by design and the horse left the stable several years ago. Key revocation is hard, nobody ever gets it right. Thus "secure" boot is irrelevant to all of this The most useful application of this kind of hardening is against remote attacks. I don't care too much that someone local can attack my machine. They can also steal it, ask me nicely with a baseball bat to remember the password and so on. If my box boots a random unsigned image that has these kinds of hardening enabled then by the time it's on a network it's much much trickier to attack. Yes you might be able to update the boot and reboot - but if I've got that far I can insert an ancient buggy signed kernel image from a vendor and chain through that anyway. Real men boot security sensitive servers off a write protected SD card. If your enterprise vendor doesn't supply a write protect for the boot partition then maybe you should ask them why they don't 8) In some ways the real application for this stuff is embedded. Whatever the boot process most embedded devices benefit from that kind of lock down. Alan