[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150520172446.4dab5399@lxorguk.ukuu.org.uk>
Date: Wed, 20 May 2015 17:24:46 +0100
From: One Thousand Gnomes <gnomes@...rguk.ukuu.org.uk>
To: Seth Forshee <seth.forshee@...onical.com>
Cc: "Luis R. Rodriguez" <mcgrof@...e.com>,
linux-security-module@...r.kernel.org, james.l.morris@...cle.com,
serge@...lyn.com, linux-kernel@...r.kernel.org,
linux-wireless@...r.kernel.org,
David Howells <dhowells@...hat.com>,
Kyle McMartin <kyle@...nel.org>,
David Woodhouse <david.woodhouse@...el.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Joey Lee <jlee@...e.de>, Rusty Russell <rusty@...tcorp.com.au>,
zohar@...ux.vnet.ibm.com, mricon@...nel.org
Subject: Re: [RFD] linux-firmware key arrangement for firmware signing
On Wed, 20 May 2015 09:04:26 -0500
Seth Forshee <seth.forshee@...onical.com> wrote:
> On Tue, May 19, 2015 at 10:02:32PM +0200, Luis R. Rodriguez wrote:
> > This begs the question on how we'd manage keys for firmware signing on
> > linux-firmare. Since the keys are x509 keys we need a CA. Based on some initial
> > discussions it would seem we'd need the Linux Foundation to create a key, this
> > would be embedded in the kernel and that key would be used to sign Kyle's key.
> > Kyle would in turn use his key for signing linux-firmware files. David, Kyle,
> > did I summarize this correctly ?
>
> I raised the question of key revocation when we discussed this on irc,
> but it wasn't answered to my satisfaction. If a key signed by the
> kernel-embedded key is compromised, how can that key be revoked so that
> it is no longer trusted?
>
> Someone mentioned UEFI blacklists, which I don't know much about, but
> not all systems have UEFI. The only reliable option that comes to mind
> for me is an in-kernel blacklist of keys which should no longer be
> trusted.
More to the point why do you want to sign firmware files ? Leaving aside
the fact that someone will produce a device with GPLv3 firmware just to
p*ss you off there's the rather more relevant fact that firmware for
devices on a so called "trusted" platform already have signed firmware.
For external devices I don't normally have access to read system memory
anyway, and signing firmware would achieve nothing unless you start doing
crazy DRM style key exchanges to prove the endpoint is trusted. Any NSA
trojan wifi stick is simply going to nod as the correct firmware is
uploaded, and then ignore it. And if I'm just out to be a pain I can
already just plug in a fake device claiming to be a usb disk with 256
bytes per sector (boom... exit machine stage right), or for that matter
wire a USB stick with 5v connected to the mains at the nearest wall
socket.
So I don't think I understand the threat model your signing hopes to fix ?
Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists