From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id B63B9C433FE for ; Fri, 15 Apr 2022 08:04:37 +0000 (UTC) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4Kfpl73T7Pz3bcK for ; Fri, 15 Apr 2022 18:04:35 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=bewilderbeest.net header.i=@bewilderbeest.net header.a=rsa-sha256 header.s=thorn header.b=bA5Se7z4; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=bewilderbeest.net (client-ip=71.19.156.171; helo=thorn.bewilderbeest.net; envelope-from=zev@bewilderbeest.net; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=bewilderbeest.net header.i=@bewilderbeest.net header.a=rsa-sha256 header.s=thorn header.b=bA5Se7z4; dkim-atps=neutral Received: from thorn.bewilderbeest.net (thorn.bewilderbeest.net [71.19.156.171]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4KfpkM5whrz2yXM for ; Fri, 15 Apr 2022 18:03:55 +1000 (AEST) Received: from hatter.bewilderbeest.net (174-21-187-98.tukw.qwest.net [174.21.187.98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: zev) by thorn.bewilderbeest.net (Postfix) with ESMTPSA id 10909428; Fri, 15 Apr 2022 01:03:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bewilderbeest.net; s=thorn; t=1650009833; bh=caixAKfJiK3utvKXQyO6urE+I2Bw6wsROljV9mda8dU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=bA5Se7z4/bY+z54I/wiILcnM2UspQw4bviKc3wmZKBm7tKkPGw+k62CF0yUR6S8g6 7dJyqtdtMCEOFaRtf483vDAsYy2VVrCJEvX0XzBJNJ1NVxVAWEyZCoc4FuugGJnDTS wJgmsoxP1y3R6GtaWDMcv1jCF/yB0u9Jzh/2apn4= Date: Fri, 15 Apr 2022 01:03:48 -0700 From: Zev Weiss To: Ryan Chen Subject: Re: [PATCH u-boot v2019.04-aspeed-openbmc v2] aspeed: add CONFIG_ASPEED_ENABLE_BACKDOORS Message-ID: References: <20220414224004.29703-1-zev@bewilderbeest.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Andrew Jeffery , "openbmc@lists.ozlabs.org" , Joel Stanley Errors-To: openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Sender: "openbmc" On Thu, Apr 14, 2022 at 08:21:00PM PDT, Ryan Chen wrote: >Hello Zev, > I don't think it is good to send a patch to enable security backdoor. > It should not be enabled, even it user aware it. > That will cause big issues in BMC. > Hi Ryan, To clarify, the current state of the code leaves the backdoors enabled on ast2400 and ast2500 (insecure/debug mode), with no easy way to turn them off. With this patch they'll be turned off by default (secure/production mode), but a user that wants to turn them back on can still do so if they explicitly request it via the new Kconfig option. The name and description of the option I think make it pretty clear that it's for debugging only and shouldn't be enabled on production systems. Is your opinion that we should apply something like this patch, but without any configurability at all? I think having the option available to leave the backdoors on could be worthwhile (I've found the debug UART useful now and then during my own development work, for example) as long as the security implications are clearly indicated. It wouldn't be the first Kconfig option that's really only appropriate for development and shouldn't be enabled in a production build (e.g. ASPEED_PALLADIUM). Thanks, Zev