From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756108AbaCNPqp (ORCPT ); Fri, 14 Mar 2014 11:46:45 -0400 Received: from mail-bn1lp0141.outbound.protection.outlook.com ([207.46.163.141]:44046 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755954AbaCNPqm (ORCPT ); Fri, 14 Mar 2014 11:46:42 -0400 From: Matthew Garrett To: "keescook@chromium.org" CC: "linux-kernel@vger.kernel.org" , "jmorris@namei.org" , "linux-security-module@vger.kernel.org" , "akpm@linux-foundation.org" , "hpa@zytor.com" , "jwboyer@fedoraproject.org" , "gnomes@lxorguk.ukuu.org.uk" , "linux-efi@vger.kernel.org" , "gregkh@linuxfoundation.org" Subject: Re: Trusted kernel patchset for Secure Boot lockdown Thread-Topic: Trusted kernel patchset for Secure Boot lockdown Thread-Index: AQHPP5llgdFEpLbAD0ahQ2OJgthmsZrgufeA Date: Fri, 14 Mar 2014 15:46:37 +0000 Message-ID: <1394811997.26846.2.camel@x230.mview.int.nebula.com> References: <1393445473-15068-1-git-send-email-matthew.garrett@nebula.com> <1394686919.25122.2.camel@x230> <1394726363.25122.16.camel@x230> <20140313212450.67f1de8e@alan.etchedpixels.co.uk> <1394746248.27846.3.camel@x230> <20140313232140.03bdaac3@alan.etchedpixels.co.uk> <1394762250.6416.24.camel@x230.lan> <20140314122231.17b9ca8a@alan.etchedpixels.co.uk> <1394801518.6416.38.camel@x230.lan> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.56.23.115] x-forefront-prvs: 0150F3F97D x-forefront-antispam-report: SFV:NSPM;SFS:(10009001)(6009001)(428001)(189002)(199002)(24454002)(377424004)(81342001)(77982001)(59766001)(80022001)(63696002)(66066001)(74502001)(85306002)(74876001)(94316002)(69226001)(74706001)(74366001)(47446002)(86362001)(33646001)(93516002)(79102001)(20776003)(2656002)(65816001)(87266001)(87936001)(95666003)(81542001)(97336001)(51856001)(47976001)(50986001)(47736001)(94946001)(97186001)(95416001)(90146001)(19580405001)(81816001)(80976001)(81686001)(83322001)(19580395003)(85852003)(92726001)(4396001)(76482001)(46102001)(54316002)(76786001)(56776001)(31966008)(93136001)(49866001)(74662001)(83072002)(92566001)(54356001)(76796001)(77096001)(56816005)(53806001);DIR:OUT;SFP:1101;SCL:1;SRVR:BN1PR05MB124;H:BN1PR05MB423.namprd05.prod.outlook.com;FPR:EC664627.91F6FD19.B1D193B3.44EEFAAE.2015E;MLV:sfv;PTR:InfoNoRecords;MX:1;A:1;LANG:en; Content-Type: text/plain; charset="utf-8" Content-ID: <42DA14E159C96B438BD6BCE7F536ACD6@namprd05.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: nebula.com Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by mail.home.local id s2EFktuP017486 On Fri, 2014-03-14 at 08:23 -0700, Kees Cook wrote: > The command line problem here is a total red herring. If you've got a > measured kernel, you have a measured command line. (If not, you don't > have a measured kernel.) Dealing with the command line has nothing to > do with enforcing the ring0/uid0 boundary which is what this patch > series does. That's why I used trusted rather than measured. The Secure Boot trust model assumes that the user is able to modify the command line (it's basically impossible to deploy generically otherwise), so we need to filter out command line options that allow a user to elevate themselves into the kernel at boot time. -- Matthew Garrett {.n++%ݶw{.n+{G{ayʇڙ,jfhz_(階ݢj"mG?&~iOzv^m ?I From mboxrd@z Thu Jan 1 00:00:00 1970 From: Matthew Garrett Subject: Re: Trusted kernel patchset for Secure Boot lockdown Date: Fri, 14 Mar 2014 15:46:37 +0000 Message-ID: <1394811997.26846.2.camel@x230.mview.int.nebula.com> References: <1393445473-15068-1-git-send-email-matthew.garrett@nebula.com> <1394686919.25122.2.camel@x230> <1394726363.25122.16.camel@x230> <20140313212450.67f1de8e@alan.etchedpixels.co.uk> <1394746248.27846.3.camel@x230> <20140313232140.03bdaac3@alan.etchedpixels.co.uk> <1394762250.6416.24.camel@x230.lan> <20140314122231.17b9ca8a@alan.etchedpixels.co.uk> <1394801518.6416.38.camel@x230.lan> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: In-Reply-To: Content-Language: en-US Content-ID: <42DA14E159C96B438BD6BCE7F536ACD6@namprd05.prod.outlook.com> Sender: linux-security-module-owner@vger.kernel.org To: "keescook@chromium.org" Cc: "linux-kernel@vger.kernel.org" , "jmorris@namei.org" , "linux-security-module@vger.kernel.org" , "akpm@linux-foundation.org" , "hpa@zytor.com" , "jwboyer@fedoraproject.org" , "gnomes@lxorguk.ukuu.org.uk" , "linux-efi@vger.kernel.org" , "gregkh@linuxfoundation.org" List-Id: linux-efi@vger.kernel.org T24gRnJpLCAyMDE0LTAzLTE0IGF0IDA4OjIzIC0wNzAwLCBLZWVzIENvb2sgd3JvdGU6DQoNCj4g VGhlIGNvbW1hbmQgbGluZSBwcm9ibGVtIGhlcmUgaXMgYSB0b3RhbCByZWQgaGVycmluZy4gSWYg eW91J3ZlIGdvdCBhDQo+IG1lYXN1cmVkIGtlcm5lbCwgeW91IGhhdmUgYSBtZWFzdXJlZCBjb21t YW5kIGxpbmUuIChJZiBub3QsIHlvdSBkb24ndA0KPiBoYXZlIGEgbWVhc3VyZWQga2VybmVsLikg RGVhbGluZyB3aXRoIHRoZSBjb21tYW5kIGxpbmUgaGFzIG5vdGhpbmcgdG8NCj4gZG8gd2l0aCBl bmZvcmNpbmcgdGhlIHJpbmcwL3VpZDAgYm91bmRhcnkgd2hpY2ggaXMgd2hhdCB0aGlzIHBhdGNo DQo+IHNlcmllcyBkb2VzLg0KDQpUaGF0J3Mgd2h5IEkgdXNlZCB0cnVzdGVkIHJhdGhlciB0aGFu IG1lYXN1cmVkLiBUaGUgU2VjdXJlIEJvb3QgdHJ1c3QNCm1vZGVsIGFzc3VtZXMgdGhhdCB0aGUg dXNlciBpcyBhYmxlIHRvIG1vZGlmeSB0aGUgY29tbWFuZCBsaW5lIChpdCdzDQpiYXNpY2FsbHkg aW1wb3NzaWJsZSB0byBkZXBsb3kgZ2VuZXJpY2FsbHkgb3RoZXJ3aXNlKSwgc28gd2UgbmVlZCB0 bw0KZmlsdGVyIG91dCBjb21tYW5kIGxpbmUgb3B0aW9ucyB0aGF0IGFsbG93IGEgdXNlciB0byBl bGV2YXRlIHRoZW1zZWx2ZXMNCmludG8gdGhlIGtlcm5lbCBhdCBib290IHRpbWUuDQoNCi0tIA0K TWF0dGhldyBHYXJyZXR0IDxtYXR0aGV3LmdhcnJldHRAbmVidWxhLmNvbT4NCg==