Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp10748271rwr; Fri, 12 May 2023 12:21:45 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5P6SRf47PAK7mjVwzgysFM6o82U4nbI+1KZN3Qfpy9lKWDByd/xFmI+bwEMo4GrQhMxmOu X-Received: by 2002:a17:90a:e7c7:b0:252:ad83:590e with SMTP id kb7-20020a17090ae7c700b00252ad83590emr3845419pjb.14.1683919305559; Fri, 12 May 2023 12:21:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683919305; cv=none; d=google.com; s=arc-20160816; b=HIH9RjZtc/Vt9jDc3BZg8T05TbH+RXVnFBZ3Zm72CCC+jA/D9CXf7RJ4F5mjqfGfBB 8/H5ckLyy2QgUBfc6SQXaF+YwYDaOoUtT0dAF80gZGnFeQuvBaMl9fzzB8Uffb6q6/Jx t5JbOfW54rHPuOxYf6Cobg3DXQ6yMvWX6HHQZz25Dk7dmmqw9IdFIcVxSjluVV/7/fu7 d3DJmNr5IlhD5HOMkC4i5XjxfPzjPl46+XraALqYp9mL2qXRMmueaq11MGPvviBujmpV w5NKyvf9LW8ecMgJX4jMSYetiDfjQAG32mYm/FB+s9paNHk9X+/yHv61JTdXPOK/V0Hp Mtqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=bOfzNavxwDsPTmOHdAEn6RBgKAMFVDn8MSMdHnaZRmQ=; b=u/XNd4wuURTyAs2fj92gjFs4kJv/U1bPzA8wj6Tm3mNqhT0Wust+FITcDrPEv2YQ5x 0n3D4We+2s8h29dS8aOv0dXHmNIo1fJDu3NT0vW6wE5hq4MHJlaxNyi2CMGgqI0XAcYG Pz5kPpHmRtwXeXFi8NbqwwDDk9RYSHHoIv8QAbee+1rZN8mts8LqtuOlETXlPQVyI/Hs W6XaLB6S9lhczT8Za7cYVKr/KHVh/7R/GJ+KOAYXdoOYhLFlQMP1E+b+qbQua59jaJEz e27fQ3FTFFSVMpVtU3MxiiHSXAQmS+vM95SW/jq19tU08j/L+eI6xJ1j676bfRndanvH hjyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o10-20020a17090a3d4a00b002448f1b24d5si23165021pjf.139.2023.05.12.12.21.24; Fri, 12 May 2023 12:21:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238077AbjELTMJ (ORCPT + 99 others); Fri, 12 May 2023 15:12:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39320 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229901AbjELTMI (ORCPT ); Fri, 12 May 2023 15:12:08 -0400 Received: from cavan.codon.org.uk (cavan.codon.org.uk [176.126.240.207]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 476D86E89; Fri, 12 May 2023 12:12:05 -0700 (PDT) Received: by cavan.codon.org.uk (Postfix, from userid 1000) id C748140A6F; Fri, 12 May 2023 20:12:03 +0100 (BST) Date: Fri, 12 May 2023 20:12:03 +0100 From: Matthew Garrett To: Thomas Gleixner Cc: Ard Biesheuvel , Eric Biggers , Ross Philipson , linux-kernel@vger.kernel.org, x86@kernel.org, linux-integrity@vger.kernel.org, linux-doc@vger.kernel.org, linux-crypto@vger.kernel.org, iommu@lists.linux-foundation.org, kexec@lists.infradead.org, linux-efi@vger.kernel.org, dpsmith@apertussolutions.com, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, James.Bottomley@hansenpartnership.com, luto@amacapital.net, nivedita@alum.mit.edu, kanth.ghatraju@oracle.com, trenchboot-devel@googlegroups.com Subject: Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements Message-ID: <20230512191203.GA21013@srcf.ucam.org> References: <20230504145023.835096-1-ross.philipson@oracle.com> <20230504145023.835096-7-ross.philipson@oracle.com> <20230510012144.GA1851@quark.localdomain> <20230512110455.GD14461@srcf.ucam.org> <20230512112847.GF14461@srcf.ucam.org> <87pm75bs3v.ffs@tglx> <20230512161318.GA18400@srcf.ucam.org> <873541bej2.ffs@tglx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <873541bej2.ffs@tglx> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, May 12, 2023 at 08:17:21PM +0200, Thomas Gleixner wrote: > On Fri, May 12 2023 at 17:13, Matthew Garrett wrote: > > On Fri, May 12, 2023 at 03:24:04PM +0200, Thomas Gleixner wrote: > >> On Fri, May 12 2023 at 12:28, Matthew Garrett wrote: > >> > Unless we assert that SHA-1 events are unsupported, it seems a bit odd > >> > to force a policy on people who have both banks enabled. People with > >> > mixed fleets are potentially going to be dealing with SHA-1 measurements > >> > for a while yet, and while there's obviously a security benefit in using > >> > SHA-2 instead it'd be irritating to have to maintain two attestation > >> > policies. > >> > >> Why? > >> > >> If you have a mixed fleet then it's not too much asked to provide two > >> data sets. On a TPM2 system you can enforce SHA-2 and only fallback to > >> SHA-1 on TPM 1.2 hardware. No? > > > > No, beause having TPM2 hardware doesn't guarantee that your firmware > > enables SHA-2 (which also means this is something that could change with > > firmware updates, which means that refusing to support SHA-1 if the > > SHA-2 banks are enabled could result in an entirely different policy > > being required (and plausibly one that isn't implemented in their > > existing tooling) > > It's not rocket science to have both variants supported in tooling, > really. People who are currently using tboot are only getting SHA-1, so there's no obvious reason for them to have added support yet. *My* tooling all supports SHA-2 so I'm completely fine here, but either we refuse to support a bunch of hardware or we have to support SHA-1 anyway, and if we have to support it the only reason not to implement it even in the "SHA-2 is supported" case is because we have opinions about how other people implement their security.