From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754213AbdKMRmy (ORCPT ); Mon, 13 Nov 2017 12:42:54 -0500 Received: from mx2.suse.de ([195.135.220.15]:44310 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754138AbdKMRmw (ORCPT ); Mon, 13 Nov 2017 12:42:52 -0500 Date: Mon, 13 Nov 2017 18:42:50 +0100 From: "Luis R. Rodriguez" To: Alan Cox Cc: "AKASHI, Takahiro" , Mimi Zohar , "Luis R. Rodriguez" , Greg Kroah-Hartman , Linus Torvalds , Jan Blunck , Julia Lawall , David Howells , Marcus Meissner , Gary Lin , linux-security-module@vger.kernel.org, linux-efi , linux-kernel@vger.kernel.org, Matthew Garrett Subject: Re: Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown Message-ID: <20171113174250.GA22894@wotan.suse.de> References: <150842463163.7923.11081723749106843698.stgit@warthog.procyon.org.uk> <14219.1509660259@warthog.procyon.org.uk> <1509660641.3416.24.camel@linux.vnet.ibm.com> <20171107230700.GJ22894@wotan.suse.de> <20171108061551.GD7859@linaro.org> <20171108194626.GQ22894@wotan.suse.de> <20171109014841.GF7859@linaro.org> <1510193857.4484.95.camel@linux.vnet.ibm.com> <20171109044619.GG7859@linaro.org> <20171111023240.2398ca55@alans-desktop> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171111023240.2398ca55@alans-desktop> User-Agent: Mutt/1.6.0 (2016-04-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Archived-At: List-Archive: List-Post: On Sat, Nov 11, 2017 at 02:32:40AM +0000, Alan Cox wrote: > > My assumption here is: > > 1) there are some less important and so security-insensitive firmwares, > > by which I mean that such firmwares won't be expected to be signed in > > terms of vulnerability or integrity. > > (I can't give you examples though.) > > 2) firmware's signature will be presented separately from the firmware > > blob itself. Say, "firmware.bin.p7s" for "firmware.bin" > > For x86 at least any firmware on any system modern enough to support > 'secure' boot should already be signed. The only major exception is > likely to be for things like random USB widgets. Alan, the firmware being considered here is /lib/firmware firmware, which is not signed today. Its unclear to me how you mean that /lib/firmware files are already signed or verified today. > The other usual exception is FPGAs, but since the point of an FPGA is > usually the fact it *can* be reprogrammed it's not clear that signing > FPGA firmware makes sense unless it is designed to be fixed function. Agreed that we may end up with exemptions where we purposely cannot get signed firmware for, or where for certain drivers this makes no sense. Luis