Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1521418pxb; Thu, 4 Feb 2021 15:34:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJwAi7IG5ELLAv7hPOOcJsU28DNb+P9k5QLINdTqjPoIeHgWw0ZAGwCm66tpBXV0Tcwytaxr X-Received: by 2002:a05:6402:110b:: with SMTP id u11mr943611edv.57.1612481643028; Thu, 04 Feb 2021 15:34:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612481643; cv=none; d=google.com; s=arc-20160816; b=yNqwwbh9YchCMfJGMrqD1MA3XW2DzHgnhhDOBprRXCgsgdhzODlcu8N8WZMYx0AQMf WpGpa/yE9TlxmgyQWtXK9jwJuXem9ez1t/viATs6M1LO/46XLVc0fsfxN+fqOlH0LjiY yAqdrw6+pi1nF+z/XhwOkO/OlRO/6oSIIu/HOEwm237efgbxQb0C0cyu9PCePaKibGzu RiX0FGLwsn0dmFRGtfaealIJ6tlKhUUvo89RRh4K25pANz4ZON0abmZR6neK57I91gvq tUY6fyPVjxTJv2wyFqX6P1flg6gfXBNkD/bvXKMcQXih6B3IVvltOL17KwTQ/gNRh+6y DANQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=Vt4+XJ07rVokVonPr9h2BRk1BSHr446JM8Qf81VkDTI=; b=YfL/L3EQMQ4lAFj5eGBPjV2TD+G68KEYvC61UbtZfAV7+ZH0kaD3HFqc/RA5+CZK+Y GksUlc/pnODvWvzi/yDkuiHeQ5LCRa7yo8uvcEqXwsHgG8q+stztj1CUHdQCYQ6Myp9k lK0Ra5OwRgW40Kq2hev3vSs5reW4W76vlDYLrZloA3rhiRyYkF16RTCJWoL9861NDMvv REBAhuEOOUm2sbBpFo9CrZoelbr/3BdAHpS5c67X4tBGHSnAyRJoH84kIUVBOxdM5ZnV rQ+2FbbJj7ydtQ02FQ9YyRtdeHvPteCEsgj31KZFEwNp9HutfP7AWFqyPav49up/4pF/ EE8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q16si4044348edc.229.2021.02.04.15.33.38; Thu, 04 Feb 2021 15:34:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234909AbhBDI1J (ORCPT + 99 others); Thu, 4 Feb 2021 03:27:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234919AbhBDI1H (ORCPT ); Thu, 4 Feb 2021 03:27:07 -0500 Received: from smtp-1909.mail.infomaniak.ch (smtp-1909.mail.infomaniak.ch [IPv6:2001:1600:3:17::1909]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4FA6AC061573; Thu, 4 Feb 2021 00:26:21 -0800 (PST) Received: from smtp-2-0000.mail.infomaniak.ch (unknown [10.5.36.107]) by smtp-2-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4DWWpy3ZwNzMqWB2; Thu, 4 Feb 2021 09:26:18 +0100 (CET) Received: from ns3096276.ip-94-23-54.eu (unknown [23.97.221.149]) by smtp-2-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4DWWpv3gtrzlpq06; Thu, 4 Feb 2021 09:26:15 +0100 (CET) Subject: =?UTF-8?Q?Re=3a_Conflict_with_Micka=c3=abl_Sala=c3=bcn=27s_blacklis?= =?UTF-8?Q?t_patches_=5bwas_=5bPATCH_v5_0/4=5d_Add_EFI=5fCERT=5fX509=5fGUID_?= =?UTF-8?Q?support_for_dbx/mokx_entries=5d?= To: Eric Snowberg , David Howells Cc: dwmw2@infradead.org, Jarkko Sakkinen , James.Bottomley@HansenPartnership.com, masahiroy@kernel.org, michal.lkml@markovi.net, jmorris@namei.org, serge@hallyn.com, ardb@kernel.org, Mimi Zohar , lszubowi@redhat.com, javierm@redhat.com, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kbuild@vger.kernel.org, linux-security-module@vger.kernel.org, Tyler Hicks References: <20210122181054.32635-1-eric.snowberg@oracle.com> <1103491.1612369600@warthog.procyon.org.uk> <10e6616e-0598-9f33-2de9-4a5268bba586@digikod.net> From: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= Message-ID: <7924ce4c-ea94-9540-0730-bddae7c6af07@digikod.net> Date: Thu, 4 Feb 2021 09:26:19 +0100 User-Agent: MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/02/2021 04:53, Eric Snowberg wrote: > >> On Feb 3, 2021, at 11:49 AM, Mickaël Salaün wrote: >> >> This looks good to me, and it still works for my use case. Eric's >> patchset only looks for asymmetric keys in the blacklist keyring, so >> even if we use the same keyring we don't look for the same key types. My >> patchset only allows blacklist keys (i.e. hashes, not asymmetric keys) >> to be added by user space (if authenticated), but because Eric's >> asymmetric keys are loaded with KEY_ALLOC_BYPASS_RESTRICTION, it should >> be OK for his use case. There should be no interference between the two >> new features, but I find it a bit confusing to have such distinct use of >> keys from the same keyring depending on their type. > > I agree, it is a bit confusing. What is the thought of having a dbx > keyring, similar to how the platform keyring works? > > https://www.spinics.net/lists/linux-security-module/msg40262.html > > >> On 03/02/2021 17:26, David Howells wrote: >>> >>> Eric Snowberg wrote: >>> >>>> This is the fifth patch series for adding support for >>>> EFI_CERT_X509_GUID entries [1]. It has been expanded to not only include >>>> dbx entries but also entries in the mokx. Additionally my series to >>>> preload these certificate [2] has also been included. >>> >>> Okay, I've tentatively applied this to my keys-next branch. However, it >>> conflicts minorly with Mickaël Salaün's patches that I've previously merged on >>> the same branch. Can you have a look at the merge commit >>> >>> https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/commit/?h=keys-next&id=fdbbe7ceeb95090d09c33ce0497e0394c82aa33d >>> >>> (the top patch of my keys-next branch) >>> >>> to see if that is okay by both of you? If so, can you give it a whirl? > > > I’m seeing a build error within blacklist_hashes_checked with > one of my configs. > > The config is as follows: > > $ grep CONFIG_SYSTEM_BLACKLIST_HASH_LIST .config > CONFIG_SYSTEM_BLACKLIST_HASH_LIST=“revocation_list" > > $ cat certs/revocation_list > "tbs:1e125ea4f38acb7b29b0c495fd8e7602c2c3353b913811a9da3a2fb505c08a32” > > make[1]: *** No rule to make target 'revocation_list', needed by 'certs/blacklist_hashes_checked'. Stop. It requires an absolute path. This is to align with other variables using the config_filename macro: CONFIG_SYSTEM_TRUSTED_KEYS, CONFIG_MODULE_SIG_KEY and now CONFIG_SYSTEM_REVOCATION_KEYS. Cf. https://lore.kernel.org/lkml/1221725.1607515111@warthog.procyon.org.uk/ We may want to patch scripts/kconfig/streamline_config.pl for both CONFIG_SYSTEM_REVOCATION_KEYS and CONFIG_SYSTEM_BLACKLIST_HASH_LIST, to warn user (and exit with an error) if such files are not found.