Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp144846pxb; Fri, 15 Jan 2021 09:24:42 -0800 (PST) X-Google-Smtp-Source: ABdhPJw3SQiVIGuv1/oOishMvwsCV85bu9rHeF5vo5uGeomrdSO+VJJwiqYeT8WHA0FUXk9C2Ytw X-Received: by 2002:a17:906:3b44:: with SMTP id h4mr1748665ejf.414.1610731481795; Fri, 15 Jan 2021 09:24:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610731481; cv=none; d=google.com; s=arc-20160816; b=kdc6gdW7WzfBDtXCWBx/TlPYhtH/KbV3BGpjbi8J52SGpKr7qdqGCH7IJvWkurwQ9a 97u1+r5UqDiX5DxSEzKMDIDE6+efeQtoMYSA89KG3ngDc7/ffjRoR2PboJmDsKPDIuP5 n7CtLIud94rbSfN/AAkQt9KagxsJBNBdkdVyOaxz6oYX+gbSJzquAjQbWd/bOka1YpPX qm/UMBNqrEXajZfW/5OvMFkUwfVS46n+/d8WirETZ1FVY/N/YifIIHMrhxYJqPB1KIaP IDBJG1qIl+czEacxKCx0sibJ86IWooj8RS4sVwtOJQE4g+9E5q5Sf9UN4OF6iketJg1T oE/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature:dkim-signature; bh=C4MxShGqB3CqLMPMSZQjPO9nwLccYL6Nz5mr8LCtaqE=; b=Psvsm5mTg64fgUmM0DxTrCEGVBoVict607UMEZcuFJX5U1CJmJLE6VRKF1OdcaXHyV BACujCPUN7GumbvGJMVPc1CXBb3kN2XZWjjBbjUhMDHlGbO4W3lacp61Qx43l9y7Ok80 aa2g1PhKfGwP2JiIVEdjGjHJADavYQ1doZaVgMQZfCcCWB2tqZCatpVwNVEDAqrglaZX hFsjWsOqcAmjq4E9EQC4bmIewi5Pyp4RLIDzB1ulLcMXysoQuuo2EPe9Ua0EKVYAZ/T4 fufnog7/Q5e3wQw467iq4GtofrfnIAH2lhmV8WUthT4w49AusTOPv8pfXMGl2kxZXZL/ nLRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=WVocnMLZ; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=WVocnMLZ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t21si4502883eds.390.2021.01.15.09.24.20; Fri, 15 Jan 2021 09:24:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=WVocnMLZ; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=WVocnMLZ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732164AbhAORWe (ORCPT + 99 others); Fri, 15 Jan 2021 12:22:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45234 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727229AbhAORWd (ORCPT ); Fri, 15 Jan 2021 12:22:33 -0500 Received: from bedivere.hansenpartnership.com (bedivere.hansenpartnership.com [IPv6:2607:fcd0:100:8a00::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9C9F7C061794; Fri, 15 Jan 2021 09:21:53 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 52C0912806CB; Fri, 15 Jan 2021 09:21:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1610731313; bh=eVzompidzUYaKPM2zxaqKrfZo1Iu4LvdVyHg60ED2NQ=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=WVocnMLZzbCjnSOMORE5QuohV98hVmsC4Hz/QWR/W0oTeUIUqdCf6p0EDHmKngv1X MpZlmnGnKPoCZOn+tbGrT62KYgsVHkSlMFopjgRL9OkH8K3qqkgmLdnTT0vYMpA2MH oRhKJLIcx0zoCS9K0e6M5lGwWIl0sw4g1JBs+BPU= Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zZuRvVCurBjz; Fri, 15 Jan 2021 09:21:53 -0800 (PST) Received: from jarvis.int.hansenpartnership.com (unknown [IPv6:2601:600:8280:66d1::c447]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 83A4412806BA; Fri, 15 Jan 2021 09:21:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1610731313; bh=eVzompidzUYaKPM2zxaqKrfZo1Iu4LvdVyHg60ED2NQ=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=WVocnMLZzbCjnSOMORE5QuohV98hVmsC4Hz/QWR/W0oTeUIUqdCf6p0EDHmKngv1X MpZlmnGnKPoCZOn+tbGrT62KYgsVHkSlMFopjgRL9OkH8K3qqkgmLdnTT0vYMpA2MH oRhKJLIcx0zoCS9K0e6M5lGwWIl0sw4g1JBs+BPU= Message-ID: <0659f965b3321e793fee03136ae50cbbcd4a53bf.camel@HansenPartnership.com> Subject: Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries From: James Bottomley To: Eric Snowberg , dhowells@redhat.com, dwmw2@infradead.org, jarkko.sakkinen@linux.intel.com Cc: herbert@gondor.apana.org.au, davem@davemloft.net, jmorris@namei.org, serge@hallyn.com, nayna@linux.ibm.com, zohar@linux.ibm.com, erichte@linux.ibm.com, mpe@ellerman.id.au, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, linux-security-module@vger.kernel.org Date: Fri, 15 Jan 2021 09:21:51 -0800 In-Reply-To: <20200916004927.64276-1-eric.snowberg@oracle.com> References: <20200916004927.64276-1-eric.snowberg@oracle.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.4 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, 2020-09-15 at 20:49 -0400, Eric Snowberg wrote: > The Secure Boot Forbidden Signature Database, dbx, contains a list of > now revoked signatures and keys previously approved to boot with UEFI > Secure Boot enabled. The dbx is capable of containing any number of > EFI_CERT_X509_SHA256_GUID, EFI_CERT_SHA256_GUID, and > EFI_CERT_X509_GUID entries. > > Currently when EFI_CERT_X509_GUID are contained in the dbx, the > entries are skipped. > > Add support for EFI_CERT_X509_GUID dbx entries. When a > EFI_CERT_X509_GUID is found, it is added as an asymmetrical key to > the .blacklist keyring. Anytime the .platform keyring is used, the > keys in the .blacklist keyring are referenced, if a matching key is > found, the key will be rejected. > > Signed-off-by: Eric Snowberg If you're using shim, as most of our users are, you have no access to dbx to blacklist certificates. Plus our security envelope includes the Mok variables, so you should also be paying attestion to MokListX (or it's RT equivalent: MokListXRT). If you add this to the patch, we get something that is mechanistically complete and which also allows users to add certs to their Mok blacklist. James