All of lore.kernel.org
 help / color / mirror / Atom feed
From: Ryan Chen <ryan_chen@aspeedtech.com>
To: Zev Weiss <zev@bewilderbeest.net>
Cc: Andrew Jeffery <andrew@aj.id.au>,
	"openbmc@lists.ozlabs.org" <openbmc@lists.ozlabs.org>,
	Joel Stanley <joel@jms.id.au>
Subject: RE: [PATCH u-boot v2019.04-aspeed-openbmc v2] aspeed: add CONFIG_ASPEED_ENABLE_BACKDOORS
Date: Fri, 15 Apr 2022 08:11:09 +0000	[thread overview]
Message-ID: <TY2PR06MB33910DF8FDDE1072646911B4F2EE9@TY2PR06MB3391.apcprd06.prod.outlook.com> (raw)
In-Reply-To: <Ylkm5L2wPl/OYR9g@hatter.bewilderbeest.net>

Hello,
	Thanks your response.
	And yes, I prefer apply patch without any config to disable it.

Ryan

> -----Original Message-----
> From: Zev Weiss <zev@bewilderbeest.net>
> Sent: Friday, April 15, 2022 4:04 PM
> To: Ryan Chen <ryan_chen@aspeedtech.com>
> Cc: Joel Stanley <joel@jms.id.au>; openbmc@lists.ozlabs.org; Andrew Jeffery
> <andrew@aj.id.au>
> Subject: Re: [PATCH u-boot v2019.04-aspeed-openbmc v2] aspeed: add
> CONFIG_ASPEED_ENABLE_BACKDOORS
> 
> On Thu, Apr 14, 2022 at 08:21:00PM PDT, Ryan Chen wrote:
> >Hello Zev,
> >	I don't think it is good to send a patch to enable security backdoor.
> >	It should not be enabled, even it user aware it.
> >	That will cause big issues in BMC.
> >
> 
> Hi Ryan,
> 
> To clarify, the current state of the code leaves the backdoors enabled on
> ast2400 and ast2500 (insecure/debug mode), with no easy way to turn them
> off.
> 
> With this patch they'll be turned off by default (secure/production mode), but a
> user that wants to turn them back on can still do so if they explicitly request it
> via the new Kconfig option.  The name and description of the option I think
> make it pretty clear that it's for debugging only and shouldn't be enabled on
> production systems.
> 
> Is your opinion that we should apply something like this patch, but without any
> configurability at all?  I think having the option available to leave the
> backdoors on could be worthwhile (I've found the debug UART useful now and
> then during my own development work, for example) as long as the security
> implications are clearly indicated.  It wouldn't be the first Kconfig option
> that's really only appropriate for development and shouldn't be enabled in a
> production build (e.g. ASPEED_PALLADIUM).
> 
> 
> Thanks,
> Zev


  reply	other threads:[~2022-04-15  8:12 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-14 22:40 [PATCH u-boot v2019.04-aspeed-openbmc v2] aspeed: add CONFIG_ASPEED_ENABLE_BACKDOORS Zev Weiss
2022-04-15  3:21 ` Ryan Chen
2022-04-15  8:03   ` Zev Weiss
2022-04-15  8:11     ` Ryan Chen [this message]
2022-04-19  0:59       ` Zev Weiss
2022-04-19  2:32         ` Ryan Chen
2022-04-19 11:10           ` Woloschin, Ian

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=TY2PR06MB33910DF8FDDE1072646911B4F2EE9@TY2PR06MB3391.apcprd06.prod.outlook.com \
    --to=ryan_chen@aspeedtech.com \
    --cc=andrew@aj.id.au \
    --cc=joel@jms.id.au \
    --cc=openbmc@lists.ozlabs.org \
    --cc=zev@bewilderbeest.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.