From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755395AbaCNP6W (ORCPT ); Fri, 14 Mar 2014 11:58:22 -0400 Received: from mail-bl2lp0206.outbound.protection.outlook.com ([207.46.163.206]:48140 "EHLO na01-bl2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754809AbaCNP6S (ORCPT ); Fri, 14 Mar 2014 11:58:18 -0400 From: Matthew Garrett To: "keescook@chromium.org" CC: "linux-kernel@vger.kernel.org" , "jmorris@namei.org" , "linux-security-module@vger.kernel.org" , "akpm@linux-foundation.org" , "hpa@zytor.com" , "jwboyer@fedoraproject.org" , "gnomes@lxorguk.ukuu.org.uk" , "linux-efi@vger.kernel.org" , "gregkh@linuxfoundation.org" Subject: Re: Trusted kernel patchset for Secure Boot lockdown Thread-Topic: Trusted kernel patchset for Secure Boot lockdown Thread-Index: AQHPP52rgdFEpLbAD0ahQ2OJgthmsZrgvR8A Date: Fri, 14 Mar 2014 15:58:02 +0000 Message-ID: <1394812682.26846.5.camel@x230.mview.int.nebula.com> References: <1393445473-15068-1-git-send-email-matthew.garrett@nebula.com> <1394686919.25122.2.camel@x230> <1394726363.25122.16.camel@x230> <20140313212450.67f1de8e@alan.etchedpixels.co.uk> <1394746248.27846.3.camel@x230> <20140313232140.03bdaac3@alan.etchedpixels.co.uk> <1394762250.6416.24.camel@x230.lan> <20140314122231.17b9ca8a@alan.etchedpixels.co.uk> <1394801518.6416.38.camel@x230.lan> <1394811997.26846.2.camel@x230.mview.int.nebula.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.56.23.115] x-forefront-prvs: 0150F3F97D x-forefront-antispam-report: SFV:NSPM;SFS:(10009001)(6009001)(428001)(377424004)(24454002)(189002)(199002)(83072002)(33646001)(85852003)(74876001)(81686001)(19580405001)(79102001)(65816001)(66066001)(97336001)(80022001)(80976001)(76786001)(81816001)(63696002)(74502001)(69226001)(83322001)(19580395003)(46102001)(51856001)(31966008)(85306002)(77982001)(81342001)(59766001)(90146001)(4396001)(92726001)(95416001)(93516002)(54316002)(74366001)(86362001)(93136001)(56776001)(47976001)(92566001)(47446002)(76482001)(87936001)(74706001)(54356001)(56816005)(76796001)(77096001)(95666003)(94316002)(97186001)(47736001)(74662001)(49866001)(2656002)(50986001)(94946001)(87266001)(53806001)(81542001);DIR:OUT;SFP:1101;SCL:1;SRVR:BN1PR05MB456;H:BN1PR05MB423.namprd05.prod.outlook.com;CLIP:172.56.23.115;FPR:F9D8718E.83259F21.A9D1116C.88C26F79.2018F;MLV:sfv;PTR:InfoNoRecords;MX:1;A:1;LANG:en; Content-Type: text/plain; charset="utf-8" Content-ID: <810F24FF5F986543B694F546A00A701C@namprd05.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: nebula.com Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by mail.home.local id s2EFwVgb017570 On Fri, 2014-03-14 at 08:54 -0700, Kees Cook wrote: > All the more reason to ignore command line at this point. For Chrome > OS, it's part of our boot state, so we don't care about it. For > generic Secure Boot, we can add checks for dangerous stuff as we go > forward. That's why I like this interface -- we can add to it as we > identify bad stuff, and it stay separate from other semantics. Sure, it's just another reason not to want to use a capability-based interface - not all the policy we want to impose is related to processes, so capabilities really don't make sense. The current patchset adds a restriction to the acpi_rsdp argument, and I've no objection to adding one to limit the use of mem=. -- Matthew Garrett {.n++%ݶw{.n+{G{ayʇڙ,jfhz_(階ݢj"mG?&~iOzv^m ?I From mboxrd@z Thu Jan 1 00:00:00 1970 From: Matthew Garrett Subject: Re: Trusted kernel patchset for Secure Boot lockdown Date: Fri, 14 Mar 2014 15:58:02 +0000 Message-ID: <1394812682.26846.5.camel@x230.mview.int.nebula.com> References: <1393445473-15068-1-git-send-email-matthew.garrett@nebula.com> <1394686919.25122.2.camel@x230> <1394726363.25122.16.camel@x230> <20140313212450.67f1de8e@alan.etchedpixels.co.uk> <1394746248.27846.3.camel@x230> <20140313232140.03bdaac3@alan.etchedpixels.co.uk> <1394762250.6416.24.camel@x230.lan> <20140314122231.17b9ca8a@alan.etchedpixels.co.uk> <1394801518.6416.38.camel@x230.lan> <1394811997.26846.2.camel@x230.mview.int.nebula.com> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: In-Reply-To: Content-Language: en-US Content-ID: <810F24FF5F986543B694F546A00A701C-HX+pjaQZbrqcE4WynfumptQqCkab/8FMAL8bYrjMMd8@public.gmane.org> Sender: linux-efi-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: "keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org" Cc: "linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" , "jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org" , "linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" , "akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org" , "hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org" , "jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy@public.gmane.org" , "gnomes-qBU/x9rampVanCEyBjwyrvXRex20P6io@public.gmane.org" , "linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" , "gregkh-hQyY1W1yCW8ekmWlsbkhG0B+6BGkLq7r@public.gmane.org" List-Id: linux-efi@vger.kernel.org T24gRnJpLCAyMDE0LTAzLTE0IGF0IDA4OjU0IC0wNzAwLCBLZWVzIENvb2sgd3JvdGU6DQoNCj4g QWxsIHRoZSBtb3JlIHJlYXNvbiB0byBpZ25vcmUgY29tbWFuZCBsaW5lIGF0IHRoaXMgcG9pbnQu IEZvciBDaHJvbWUNCj4gT1MsIGl0J3MgcGFydCBvZiBvdXIgYm9vdCBzdGF0ZSwgc28gd2UgZG9u J3QgY2FyZSBhYm91dCBpdC4gRm9yDQo+IGdlbmVyaWMgU2VjdXJlIEJvb3QsIHdlIGNhbiBhZGQg Y2hlY2tzIGZvciBkYW5nZXJvdXMgc3R1ZmYgYXMgd2UgZ28NCj4gZm9yd2FyZC4gVGhhdCdzIHdo eSBJIGxpa2UgdGhpcyBpbnRlcmZhY2UgLS0gd2UgY2FuIGFkZCB0byBpdCBhcyB3ZQ0KPiBpZGVu dGlmeSBiYWQgc3R1ZmYsIGFuZCBpdCBzdGF5IHNlcGFyYXRlIGZyb20gb3RoZXIgc2VtYW50aWNz Lg0KDQpTdXJlLCBpdCdzIGp1c3QgYW5vdGhlciByZWFzb24gbm90IHRvIHdhbnQgdG8gdXNlIGEg Y2FwYWJpbGl0eS1iYXNlZA0KaW50ZXJmYWNlIC0gbm90IGFsbCB0aGUgcG9saWN5IHdlIHdhbnQg dG8gaW1wb3NlIGlzIHJlbGF0ZWQgdG8NCnByb2Nlc3Nlcywgc28gY2FwYWJpbGl0aWVzIHJlYWxs eSBkb24ndCBtYWtlIHNlbnNlLiBUaGUgY3VycmVudCBwYXRjaHNldA0KYWRkcyBhIHJlc3RyaWN0 aW9uIHRvIHRoZSBhY3BpX3JzZHAgYXJndW1lbnQsIGFuZCBJJ3ZlIG5vIG9iamVjdGlvbiB0bw0K YWRkaW5nIG9uZSB0byBsaW1pdCB0aGUgdXNlIG9mIG1lbT0uDQoNCi0tIA0KTWF0dGhldyBHYXJy ZXR0IDxtYXR0aGV3LmdhcnJldHRAbmVidWxhLmNvbT4NCg==