[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130301100052.GA20085@suse.cz>
Date: Fri, 1 Mar 2013 11:00:52 +0100
From: Vojtech Pavlik <vojtech@...e.cz>
To: Matthew Garrett <mjg59@...f.ucam.org>
Cc: Jiri Kosina <jkosina@...e.cz>, David Howells <dhowells@...hat.com>,
Linus Torvalds <torvalds@...ux-foundation.org>,
jwboyer@...hat.com, pjones@...hat.com, vgoyal@...hat.com,
keescook@...omium.org, keyrings@...ux-nfs.org,
linux-kernel@...r.kernel.org, Greg KH <gregkh@...uxfoundation.org>,
Florian Weimer <fw@...eb.enyo.de>,
Paolo Bonzini <pbonzini@...hat.com>
Subject: Re: [GIT PULL] Load keys from signed PE binaries
On Thu, Feb 28, 2013 at 10:51:15PM +0000, Matthew Garrett wrote:
> On Thu, Feb 28, 2013 at 11:48:06PM +0100, Jiri Kosina wrote:
>
> > Let me formulate my point more clearly -- Microsoft very likely going to
> > sign hello world EFI PE binary, no matter the contents of .keylist
> > section, as they don't give a damn about this section, as it has zero
> > semantic value to them, right?
> >
> > They sign the binary. By signing the binary, they are *NOT* establishing
> > cryptographic chain of trust to the key stored in .keylist, but your
> > patchset seems to imply so.
>
> Mr Evil Blackhat's binary is then a mechanism for circumventing the
> Windows trust mechanism, and as such his account is subject to
> termination and his binary can be added to dbx.
Why?
Let's take a look on what would happen in this scenario:
A PE binary, from Mr. Blackhat, doing nothing, in general, but
containing a key in a section, was signed by MS on the grounds that the
binary isn't harmful.
By issuing the signature, MS is attesting that the binary is safe, but
isn't saying anything about the data (key) embedded in it. It doesn't
say the key comes from a trusted party. It just says "this isn't
malware", and that's what their tools verify.
Your shim loader (signed by MS) loads your Linux kernel.
Your Linux kernel, then, based on the key-in-PE model decides to trust
the key, although nobody really said it's to be trusted.
Mr. Blackhat then can load his i_own_your_ring0.ko module signed by his
key on your system, having obtained root access previously.
You call Microsoft, telling them what Mr. Blackhat has done.
They now can:
a) Do what you want: Disable Mr. Blackhat's account and revoke the hash
of his binary.
But also:
b) Say, "oh well, we're sorry this kills your security model, but it's
enough for us that you already fully booted Linux to worry about Windows
security, this affects only your distribution and we don't care".
c) Decide your security model is flawed, because you're abusing their
signature process to mean something else from what they intended and
revoke your shim hash instead.
And I don't think you can rely on MS doing 'a'. Particularly when there
will be a large number of key-in-PE binaries signed by them at that
point, with them not being able to tell by any analysis which of them
are evil and which not.
I would even say b) is most likely.
> We'd check the binary hash against dbx and refuse to load it on
> systems that have received the update, and Mr Evil Blackhat would have
> to find a new bunch of identity documents to create a new account to
> repeat the process.
Yes, from the point it gets blacklisted, it's fairly clear. You're
forced to reboot, but under the Secure Boot model, you have to do that
on any system that used code whose hash has been revoked.
--
Vojtech Pavlik
Director SuSE Labs
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists