lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 11 Apr 2022 16:39:42 +0000
From:   Eric Snowberg <eric.snowberg@...cle.com>
To:     Michal Suchánek <msuchanek@...e.de>
CC:     David Howells <dhowells@...hat.com>,
        "dwmw2@...radead.org" <dwmw2@...radead.org>,
        "ardb@...nel.org" <ardb@...nel.org>,
        Jarkko Sakkinen <jarkko@...nel.org>,
        "jmorris@...ei.org" <jmorris@...ei.org>,
        "serge@...lyn.com" <serge@...lyn.com>,
        "nayna@...ux.ibm.com" <nayna@...ux.ibm.com>,
        Mimi Zohar <zohar@...ux.ibm.com>,
        "keescook@...omium.org" <keescook@...omium.org>,
        "torvalds@...ux-foundation.org" <torvalds@...ux-foundation.org>,
        "weiyongjun1@...wei.com" <weiyongjun1@...wei.com>,
        "keyrings@...r.kernel.org" <keyrings@...r.kernel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "linux-efi@...r.kernel.org" <linux-efi@...r.kernel.org>,
        "linux-security-module@...r.kernel.org" 
        <linux-security-module@...r.kernel.org>,
        "James.Bottomley@...senpartnership.com" 
        <James.Bottomley@...senpartnership.com>,
        "pjones@...hat.com" <pjones@...hat.com>,
        Konrad Wilk <konrad.wilk@...cle.com>
Subject: Re: [PATCH v10 8/8] integrity: Only use machine keyring when
 uefi_check_trust_mok_keys is true



> On Apr 11, 2022, at 5:06 AM, Michal Suchánek <msuchanek@...e.de> wrote:
> 
> Hello,
> 
> On Tue, Jan 25, 2022 at 09:58:34PM -0500, Eric Snowberg wrote:
>> With the introduction of uefi_check_trust_mok_keys, it signifies the end-
> 
> What value does such flag have?
> 
> The user is as much in control of the flag as the MOK keys.

The flag allows the system owner (not root) the ability to determine 
if they want to load MOKList into the machine keyring.  Keys contained 
in the machine keyring are then linked to the secondary.  The flag is no 
different than the '—ignore-db' currently available in shim, which then 
gets propagated to Linux (uefi_check_ignore_db).  These flags can be 
set by the system owner, who can prove physical presence.  

>> user wants to trust the machine keyring as trusted keys.  If they have
>> chosen to trust the machine keyring, load the qualifying keys into it
>> during boot, then link it to the secondary keyring .  If the user has not
>> chosen to trust the machine keyring, it will be empty and not linked to
>> the secondary keyring.
> 
> Why is importing the keys and using them linked together?
> 
> If later we get, say, machine keyring on powerpc managed by secvarctl
> then it has its value to import the keyring and be able to list the
> content with the same tools on EFI and powerpc.

The machine keyring is linked to the secondary keyring, exactly the same way 
the builtin is linked to it.  Linking this way should eliminate the need to change 
any user space tools to list the contents. 

> It also makes sense to be able to configure the kernel to import the
> keys and not use them. I don't see any value in configuring that in
> shim, though. shim is both source of the key material and the flag so
> the flag is redundant, it does not exist on existing shim versions
> installed on user systems, and it's unlikely to exist on other
> plaltforms, either.

I’m sure other solutions to enable it will be accepted as well.  I know Mimi was testing 
without shim using a different method.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ