[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130227145647.GA5184@srcf.ucam.org>
Date: Wed, 27 Feb 2013 14:56:47 +0000
From: Matthew Garrett <mjg59@...f.ucam.org>
To: ownssh <ownssh@...il.com>
Cc: linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] Load keys from signed PE binaries
On Wed, Feb 27, 2013 at 09:35:24AM +0000, ownssh wrote:
> I think, redhat should have their own root key to sign binary files.
> Bootloader of install media can be sign by MS certificates, but only use to add
> the redhat root key to UEFI database before install.
There's no way to update the UEFI key database without the update being
signed by an already trusted key, so what you're proposing isn't
possible.
--
Matthew Garrett | mjg59@...f.ucam.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists