openbmc.lists.ozlabs.org archive mirror
 help / color / mirror / Atom feed
From: Patrick Williams <patrick@stwcx.xyz>
To: Joseph Reynolds <jrey@linux.ibm.com>
Cc: openbmc <openbmc@lists.ozlabs.org>
Subject: Re: Security Working Group - Wednesday May 26 - results
Date: Thu, 27 May 2021 07:56:35 -0500	[thread overview]
Message-ID: <YK+XA0umnkj1EveY@heinlein> (raw)
In-Reply-To: <30dde28a-38ff-6c59-57f4-23ed3fb46130@linux.ibm.com>

[-- Attachment #1: Type: text/plain, Size: 2692 bytes --]

On Wed, May 26, 2021 at 01:59:57PM -0500, Joseph Reynolds wrote:
> On 5/26/21 8:43 AM, Joseph Reynolds wrote:
 
> > 1. Followup from last meeting re uboot, kexec, sysrq-trigger on ARM 
> > architecture.
> We re-hashed the discussion, added new information, and added new concerns.

Could you paste the minutes here when you reply to these?  It is kind of
hard to have any discussion with the rest of the community when you have
2-3 levels of indirection to get at the words.

> We think there are cultural differences between Linux and open source
> with respect to how we handle security items (but we didn't get into any
> details).

It is really hard to know what this is referring to or means or how it
might impact us.  There is no such thing as "open source" as something
different and separate from "Linux".  Certainly many sub-communities
within the OSS world have different priorities and approaches when it
comes to security.  This sounds like it was just idle chatter.

> Kernel's modules expect BMC hardware to be in a particular state. Kernel
> kexec’ing might lead to undefined behavior for such modules.

I think we're just talking about normal bugs here.  Those would be
caught and fixed in testing, wouldn't they?

> Worried about interactions with secure boot.
> Scenario: kernel 1 boots, then the BMC gets compromised, then kernel 2
> is kexec’d.

What is the "worry" here?  This isn't an unsolved problem as servers
have to deal with this all the time.

This is why secureboot itself isn't really all that useful without
attestation.  There are going to be compromised images.  You put them in
a block list.  When you kexec, since you haven't gone through a reset,
the TPM still contains the measurements from the compromised / blocked
image (which have now been extende with the kexec measurements as well).
So any system running code that is in your block list is still blocked
because you can't trust that it wasn't compromised.

> Kexec does not significantly improve the boot time of BMC.

And?  Was someone suggesting it would?  Not sure the context.

It seems like whoever is involved in these discussions is missing the
purpose of enabling kexec.  I don't think anyone is talking about using
kexec as a way to make some minor improvement in a once-in-a-while
OpenBMC upgrade + reboot path.

Kexec is being talked about because it is *the way you get kernel debug*
now.  Kdump requires kexec.  When the kernel crashes, you kexec to the
kdump kernel, it garthers a bunch of data, hopefully stores it in flash,
and then you can do a proper reboot back to your buggy-crashing kernel.

-- 
Patrick Williams

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

  reply	other threads:[~2021-05-27 12:57 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-05-26 13:43 Security Working Group - Wednesday May 26 Joseph Reynolds
2021-05-26 18:59 ` Security Working Group - Wednesday May 26 - results Joseph Reynolds
2021-05-27 12:56   ` Patrick Williams [this message]
2021-05-27 15:04     ` Joseph Reynolds
2021-05-28  3:09       ` Andrew Jeffery
2021-06-02 15:19         ` Ed Tanous

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YK+XA0umnkj1EveY@heinlein \
    --to=patrick@stwcx.xyz \
    --cc=jrey@linux.ibm.com \
    --cc=openbmc@lists.ozlabs.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).