From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id C8BFA78D for ; Wed, 3 Aug 2016 17:29:13 +0000 (UTC) Received: from mail-vk0-f44.google.com (mail-vk0-f44.google.com [209.85.213.44]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 31F842B4 for ; Wed, 3 Aug 2016 17:29:13 +0000 (UTC) Received: by mail-vk0-f44.google.com with SMTP id w127so151490077vkh.2 for ; Wed, 03 Aug 2016 10:29:13 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <27174.1470221030@warthog.procyon.org.uk> From: Andy Lutomirski Date: Wed, 3 Aug 2016 10:28:51 -0700 Message-ID: To: Matthew Garrett Content-Type: text/plain; charset=UTF-8 Cc: James Bottomley , Josh Boyer , Jason Cooper , "ksummit-discuss@lists.linuxfoundation.org" , Mark Brown Subject: Re: [Ksummit-discuss] [TOPIC] Secure/verified boot and roots of trust List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Wed, Aug 3, 2016 at 10:26 AM, Matthew Garrett wrote: > On Wed, Aug 3, 2016 at 10:23 AM, Andy Lutomirski wrote: >> On Wed, Aug 3, 2016 at 10:17 AM, Matthew Garrett wrote: >>> Keys could be stored in a separate section and ignored for the >>> purposes of build comparison. >> >> But that defeats the purpose. If I'm verifying a reproducible build, >> I don't want to have to take it on faith that the packager didn't keep >> a copy of the build-time key. > > If you're trusting your upstream's signed bootloader you're already > forced to trust your packagers. If you want to establish your own root > of trust you could simply strip that section, replace it with your own > and re-sign the modules and kernel. Or just keep using signatures, > sign the public module signing key with the kernel signing key and > push the policy decision out to the bootloader. But only sort of. If the upstream bootloader signature serves only to make Secure Boot accept it, then I don't really care if the owner of that signing key is evil, because they can't do anything with that key without physical access. -- Andy Lutomirski AMA Capital Management, LLC