[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130226034250.GB30285@srcf.ucam.org>
Date: Tue, 26 Feb 2013 03:42:50 +0000
From: Matthew Garrett <mjg59@...f.ucam.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Theodore Ts'o <tytso@....edu>,
Greg KH <gregkh@...uxfoundation.org>,
David Howells <dhowells@...hat.com>,
Florian Weimer <fw@...eb.enyo.de>,
Josh Boyer <jwboyer@...hat.com>,
Peter Jones <pjones@...hat.com>,
Vivek Goyal <vgoyal@...hat.com>,
Kees Cook <keescook@...omium.org>, keyrings@...ux-nfs.org,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [GIT PULL] Load keys from signed PE binaries
On Mon, Feb 25, 2013 at 07:32:04PM -0800, Linus Torvalds wrote:
> On Mon, Feb 25, 2013 at 7:28 PM, Matthew Garrett <mjg59@...f.ucam.org> wrote:
> >
> > You're happy advising Linux vendors that they don't need to worry about
> > module signing because it's "not obvious" that Microsoft would actually
> > enforce the security model they've spent significant money developing
> > and advertising?
>
> And you're happy shilling for a broken model?
>
> The fact is, the only valid user for the whole security model is to
> PROTECT THE USER.
The user Microsoft care about isn't running Linux. The user is running
Windows, and someone's merely using Linux as a vector to launch their
backdoored Windows kernel. How do Microsoft protect that user? They
blacklist the signature used by that Linux bootloader. If we want to
protect the user's ability to boot Linux, we need to protect the
Windows users from having Linux used against them.
--
Matthew Garrett | mjg59@...f.ucam.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists