Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp2223434rwp; Fri, 14 Jul 2023 02:52:07 -0700 (PDT) X-Google-Smtp-Source: APBJJlGYbtTm8Uk8ilDu+AJxYp0JC3hCci9rEV7cWH/ObbXIsoVkihiJwPbXo+ceqR3y9rHTQvRd X-Received: by 2002:a17:90b:4f85:b0:263:feab:2804 with SMTP id qe5-20020a17090b4f8500b00263feab2804mr2709645pjb.37.1689328326805; Fri, 14 Jul 2023 02:52:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689328326; cv=none; d=google.com; s=arc-20160816; b=YJIhjN1JCw/1JQOcx/00E60hrlJ38IdqPIEXqY/ExyZTrIFf6vhwHkzbsdT9R+1A9I sV7mxiD8l3xgh1sWsrMGEMmRST8VBE59TOeVPEeN41SNAnn7lawlktZ17WC6vBPzKuyA RV2g0v3nQVFKPGHBOexoQbG+lMb1i2diXl5RhRExVubmeORPZ2YSGxqkDw3d1hNuq3rV T5dxi3uEguAIKHPeKFrz2lFP1dM4j+TxASGcKa49MqNMEWe4x4hoLh2J1S62/1DB37vh EPX1s757vHjeK7O1ANks1h9m/ZfOPRd0R2anGYA+GSUQGWFLXtCEzpg0MFrYxC2EDYYp ZOrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=UR2PQiTkOraF/bPw+g8tGmTxW93mOHT7lPZ28fwQOFk=; fh=fjCX/tuLYo4XF6wEZCSzC5P4aXM30ysIB8z2ga5yF7w=; b=fRJ5jIMTLyeB1YFZQI4R6aFnoi2Dtpp2/Q8SK5ZHNrEls9/GIGpxZfiQQtwgeWLWZV 5x17ONdVDfEoQau1b9nv+v83bPMyOGio9ZRUz3hV+nsJpVDYCrhd3R0l7FvITCzn9bxg 2JKnkR95LBf96BQvDDhEFdfpXDvsneP2ojwMkpsttT6UFC51hHK8wjZHbpTByqBMnQou Un8RiXMilL4PWlJl/w6HVNBqNvsD52CXSJvivvAWaGiJ9Q5VofUxHu0F9fR91xZrIlle 9/JESTNDUYrddKQvkojaYoll4UhBbUKFBdqefC54ly+utD3wzO4q4KrWTsPkZqrRpCIF ughQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OwskA8Mi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lp11-20020a17090b4a8b00b0026333ca2944si1041857pjb.17.2023.07.14.02.51.54; Fri, 14 Jul 2023 02:52:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OwskA8Mi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235783AbjGNJPE (ORCPT + 99 others); Fri, 14 Jul 2023 05:15:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234953AbjGNJPC (ORCPT ); Fri, 14 Jul 2023 05:15:02 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25E9FE65; Fri, 14 Jul 2023 02:15:02 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 954D861BE9; Fri, 14 Jul 2023 09:15:01 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F192BC4339A; Fri, 14 Jul 2023 09:15:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689326101; bh=UR2PQiTkOraF/bPw+g8tGmTxW93mOHT7lPZ28fwQOFk=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=OwskA8MiBl+tCCRvL+2eVNppC5lcMnMXfX+lB/WshioJtkJEDn/tXihFYSuB8WZhI DFXZdIP49gZ0cQEiecuTdppuMzopbmRdIoM3AeFXFZ+hOUasMD2Kv7kWHevm8svmGi +y6dM7TaIfKf+81fwmwsm24p8bPWMJD6qFZ/JBcRBvlanNl1lTd84qd1reP0isH76R jBOHdyE1nQ4AJMgRZI4Zih0HAZwWAvIYeQdYpdFv4KclJ+djhf2ZkBodhSef2OTE4T mUPTER7KRWZMQmEPhC0V0lbNduWtqjrJ6bviP1DMOFYtJc1/cMJbbS6Lm6Xr8z0De7 2Ds5ssnH52AHA== Received: by mail-lf1-f42.google.com with SMTP id 2adb3069b0e04-4fbf1f6c771so2879288e87.1; Fri, 14 Jul 2023 02:15:00 -0700 (PDT) X-Gm-Message-State: ABy/qLbJpJc2JQTHJRerFwf70yX7y0TMJRLUTF4ZO9VkHXVYt6sGqum0 sXHiwx44XSl0WSuaTqTD5scjmtne5m63zlDaFR4= X-Received: by 2002:ac2:43c4:0:b0:4f8:5f32:b1da with SMTP id u4-20020ac243c4000000b004f85f32b1damr2953923lfl.24.1689326098874; Fri, 14 Jul 2023 02:14:58 -0700 (PDT) MIME-Version: 1.0 References: <20230711154449.1378385-1-eesposit@redhat.com> <20230714091310.GA21128@srcf.ucam.org> In-Reply-To: <20230714091310.GA21128@srcf.ucam.org> From: Ard Biesheuvel Date: Fri, 14 Jul 2023 11:14:47 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage To: Matthew Garrett Cc: Luca Boccassi , Peter Jones , Emanuele Giuseppe Esposito , x86@kernel.org, Thomas Gleixner , lennart@poettering.net, Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Andrew Morton , Masahiro Yamada , Alexander Potapenko , Nick Desaulniers , Vitaly Kuznetsov , =?UTF-8?Q?Daniel_P_=2E_Berrang=C3=A9?= , linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 14 Jul 2023 at 11:13, Matthew Garrett wrote: > > On Fri, Jul 14, 2023 at 10:52:20AM +0200, Ard Biesheuvel wrote: > > > Maybe the OEMs have gotten better at this over the years, but it is > > definitely not possible for the distros to rely on being able to get > > their own cert into KEK and sign their builds directly. > > Getting certs into local machine databases should[1] be possible on all > Windows certified machines, but in the status-quo there's no > cross-vendor solution to doing this. Relying on the Shim-provided > mechanisms is much safer from a consistency perspective. > > [1] Every time someone has claimed it's impossible to me I've ended up > demonstrating otherwise, but that's not a guarantee Interesting. So by 'demonstrating', do you mean running some EFI app that calls SetVariable() on PK/KEK/db directly, rather than going via the UI?