Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936081Ab2KAQ1E (ORCPT ); Thu, 1 Nov 2012 12:27:04 -0400 Received: from cavan.codon.org.uk ([93.93.128.6]:45832 "EHLO cavan.codon.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S936000Ab2KAQ1A (ORCPT ); Thu, 1 Nov 2012 12:27:00 -0400 Date: Thu, 1 Nov 2012 16:26:51 +0000 From: Matthew Garrett To: James Bottomley Cc: Eric Paris , Jiri Kosina , Oliver Neukum , Chris Friesen , Alan Cox , Josh Boyer , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org Subject: Re: [RFC] Second attempt at kernel secure boot support Message-ID: <20121101162651.GD13132@srcf.ucam.org> References: <36538307.gzWq1oO7Kg@linux-lqwf.site> <1351760905.2391.19.camel@dabdike.int.hansenpartnership.com> <1351762703.2391.31.camel@dabdike.int.hansenpartnership.com> <1351763954.2391.37.camel@dabdike.int.hansenpartnership.com> <1351780935.2391.58.camel@dabdike.int.hansenpartnership.com> <20121101144912.GA10269@srcf.ucam.org> <1351782390.2391.69.camel@dabdike.int.hansenpartnership.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1351782390.2391.69.camel@dabdike.int.hansenpartnership.com> User-Agent: Mutt/1.5.20 (2009-06-14) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: mjg59@cavan.codon.org.uk X-SA-Exim-Scanned: No (on cavan.codon.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 813 Lines: 18 On Thu, Nov 01, 2012 at 03:06:30PM +0000, James Bottomley wrote: > But surely that's fanciful ... you've already compromised windows to get > access to the ESP. If you've done it once, you can do it again until > the exploit is patched. There are likely many easier ways of ensuring > persistence than trying to install a full linux kernel with a > compromised resume system. There's a pretty strong distinction between "Machine is exploited until exploit is patched" and "Machine is exploited until drive is replaced". -- Matthew Garrett | mjg59@srcf.ucam.org -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/