ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* [Ksummit-discuss] [CORE TOPIC] Trusted kernel patchset
@ 2014-05-07 18:03 Matthew Garrett
  2014-05-07 18:14 ` Josh Boyer
  2014-05-07 18:53 ` Andy Lutomirski
  0 siblings, 2 replies; 3+ messages in thread
From: Matthew Garrett @ 2014-05-07 18:03 UTC (permalink / raw)
  To: ksummit-discuss

(Posting as core rather than tech because I suspect this is more 
political than technical at this point)

Most major distributions ship these. There is strong demand from Google, 
who want to use them in a use-case that has nothing to do with UEFI 
Secure Boot. Making a distinction between root and kernel security is a 
necessary part of securing a boot chain[1].

Yet, after apparently gaining at least a rough consensus at LPC last 
year, we're now at the point where there's yet another suggestion for 
how to rewrite them but absolutely nobody showing any signs of being 
willing to do that work or any agreement from anyone in the security 
community that entirely reworking capabilities is either practical or 
desirable.

It'd be nice to have this done before August, but given that all 
previous attempts to actually get it unblocked on mailing lists have 
failed maybe we should talk about it in person. Again.

[1] See: the large number of people running modified kernels on their 
Android devices by using the signed vendor kernel to kexec them. Great 
for freedom, bad for the guarantees you were attempting to provide 
regarding trusted code

-- 
Matthew Garrett | mjg59@srcf.ucam.org

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [Ksummit-discuss] [CORE TOPIC] Trusted kernel patchset
  2014-05-07 18:03 [Ksummit-discuss] [CORE TOPIC] Trusted kernel patchset Matthew Garrett
@ 2014-05-07 18:14 ` Josh Boyer
  2014-05-07 18:53 ` Andy Lutomirski
  1 sibling, 0 replies; 3+ messages in thread
From: Josh Boyer @ 2014-05-07 18:14 UTC (permalink / raw)
  To: Matthew Garrett; +Cc: ksummit-discuss

On Wed, May 7, 2014 at 2:03 PM, Matthew Garrett <mjg59@srcf.ucam.org> wrote:
> (Posting as core rather than tech because I suspect this is more
> political than technical at this point)
>
> Most major distributions ship these. There is strong demand from Google,
> who want to use them in a use-case that has nothing to do with UEFI
> Secure Boot. Making a distinction between root and kernel security is a
> necessary part of securing a boot chain[1].
>
> Yet, after apparently gaining at least a rough consensus at LPC last
> year, we're now at the point where there's yet another suggestion for
> how to rewrite them but absolutely nobody showing any signs of being
> willing to do that work or any agreement from anyone in the security
> community that entirely reworking capabilities is either practical or
> desirable.
>
> It'd be nice to have this done before August, but given that all
> previous attempts to actually get it unblocked on mailing lists have
> failed maybe we should talk about it in person. Again.

I think it's fairly obvious I'd like to attend this.  Other suggested
people would be:

James Bottomley
James Morris
Kees Cook
Joey Li
Gary Lin
Vojtech Pavlik

josh

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [Ksummit-discuss] [CORE TOPIC] Trusted kernel patchset
  2014-05-07 18:03 [Ksummit-discuss] [CORE TOPIC] Trusted kernel patchset Matthew Garrett
  2014-05-07 18:14 ` Josh Boyer
@ 2014-05-07 18:53 ` Andy Lutomirski
  1 sibling, 0 replies; 3+ messages in thread
From: Andy Lutomirski @ 2014-05-07 18:53 UTC (permalink / raw)
  To: Matthew Garrett; +Cc: ksummit-discuss

On Wed, May 7, 2014 at 11:03 AM, Matthew Garrett <mjg59@srcf.ucam.org> wrote:
> (Posting as core rather than tech because I suspect this is more
> political than technical at this point)
>
> Most major distributions ship these. There is strong demand from Google,
> who want to use them in a use-case that has nothing to do with UEFI
> Secure Boot. Making a distinction between root and kernel security is a
> necessary part of securing a boot chain[1].
>
> Yet, after apparently gaining at least a rough consensus at LPC last
> year, we're now at the point where there's yet another suggestion for
> how to rewrite them but absolutely nobody showing any signs of being
> willing to do that work or any agreement from anyone in the security
> community that entirely reworking capabilities is either practical or
> desirable.

I am very interested in this, both from the POV of how capabilities do
and/or should work, and of what trusted boot should do.

There is a lot of very vocal opposition to any change in the way that
capabilities work, and I think that, at some point, it might be
helpful if enough people who think that capabilities can change
reached some kind of consensus so that something can be done.

That being said, capabilities are a giant mess, and it might be really
hard to fix them.

--Andy

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2014-05-07 18:53 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-05-07 18:03 [Ksummit-discuss] [CORE TOPIC] Trusted kernel patchset Matthew Garrett
2014-05-07 18:14 ` Josh Boyer
2014-05-07 18:53 ` Andy Lutomirski

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox