[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20121001210034.GA21712@elf.ucw.cz>
Date: Mon, 1 Oct 2012 23:00:34 +0200
From: Pavel Machek <pavel@....cz>
To: Matthew Garrett <mjg@...hat.com>
Cc: linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org, linux-efi@...r.kernel.org
Subject: Re: [PATCH 02/11] PCI: Lock down BAR access in secure boot
environments
On Tue 2012-09-04 11:55:08, Matthew Garrett wrote:
> Any hardware that can potentially generate DMA has to be locked down from
> userspace in order to avoid it being possible for an attacker to cause
> arbitrary kernel behaviour. Default to paranoid - in future we can
> potentially relax this for sufficiently IOMMU-isolated devices.
Would it be possible to
1) Use some better name than CAP_SECURE_FIRMWARE
2) Explain somewhere what the real requirements for "secure" boot are?
"Secure" kernel may not boot unsigned kernel... what does it mean
exactly?
Suppose I launch full-screen window with dosemu running original
windows installation on HDD, accessing raw disks, at nearly native
speed. That is not something kernel should prevent, but it still
allows me to do to do the stuff "secure" boot was designed to
prevent... right?
What is the exact threat "secure" boot should protect us against?
Pavel
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists