From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Authentication-Results: lists.ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=fuzziesquirrel.com (client-ip=173.167.31.197; helo=bajor.fuzziesquirrel.com; envelope-from=bradleyb@fuzziesquirrel.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=fuzziesquirrel.com Received: from bajor.fuzziesquirrel.com (mail.fuzziesquirrel.com [173.167.31.197]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 43v64k159FzDqM4 for ; Wed, 6 Feb 2019 01:13:40 +1100 (AEDT) X-Virus-Scanned: amavisd-new at fuzziesquirrel.com Date: Tue, 5 Feb 2019 09:14:03 -0500 From: Brad Bishop To: openbmc@lists.ozlabs.org Subject: Secure boot for BMC Message-ID: <20190205141403.y2yno3nmxvwgd6ex@thinkpad> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 Feb 2019 14:13:42 -0000 Hi everyone Does anyone have plans to provide a secure BMC boot implementation to OpenBMC in the 2.7 or 2.8 timeframe? Just trying to get a feel for who all wants to collaborate on this before I submit a design template. thx - brad