Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758726Ab2JaRVr (ORCPT ); Wed, 31 Oct 2012 13:21:47 -0400 Received: from cantor2.suse.de ([195.135.220.15]:32970 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754786Ab2JaRVp (ORCPT ); Wed, 31 Oct 2012 13:21:45 -0400 Date: Wed, 31 Oct 2012 18:21:39 +0100 (CET) From: Jiri Kosina To: Alan Cox Cc: Matthew Garrett , Josh Boyer , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org Subject: Re: [RFC] Second attempt at kernel secure boot support In-Reply-To: <20121031172121.14cc1215@pyramind.ukuu.org.uk> Message-ID: References: <1348152065-31353-1-git-send-email-mjg@redhat.com> <20121029174131.GC7580@srcf.ucam.org> <20121031155503.1aaf4c93@pyramind.ukuu.org.uk> <20121031170334.59833fb1@pyramind.ukuu.org.uk> <20121031171048.GA17163@srcf.ucam.org> <20121031172121.14cc1215@pyramind.ukuu.org.uk> User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 760 Lines: 23 On Wed, 31 Oct 2012, Alan Cox wrote: > > > > Prepare (as a root) a hand-crafted image, reboot, let the kernel resume > > > > from that artificial image. > > > > > > It's not signed. It won't reboot from that image. > > > > The kernel is signed. The kernel doesn't check the signature on the > > suspend image. > > Which doesn't matter. How are you going to create the tampered image in > the first place ? Editing the suspend partition/file directly when trusted kernel is booted. -- Jiri Kosina SUSE Labs -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/