From: Matthew Garrett <mjg59-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org>
To: James Bottomley
<James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
Cc: linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
linux-kernel
<linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
Subject: Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
Date: Tue, 19 Mar 2013 18:28:10 +0000 [thread overview]
Message-ID: <20130319182810.GA13003@srcf.ucam.org> (raw)
In-Reply-To: <1363717411.2377.68.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
On Tue, Mar 19, 2013 at 06:23:31PM +0000, James Bottomley wrote:
> The scheme we discussed, unless something radically changed, was to
> convey a temporary key pair via a mechanism to later verify the
> hybernate kernel on a resume. That only requires reboot safe knowledge
> of the public key. The private key can be conveyed in BS only (not NV),
> and should be consumed (as in deleted) by the OS when it receives it, so
> it wouldn't be exposed by this patch.
It requires the key to survive the system being entirely powered down,
which means it needs to be BS+NV. It shouldn't be possible for userspace
to access this key.
--
Matthew Garrett | mjg59-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org
WARNING: multiple messages have this Message-ID (diff)
From: Matthew Garrett <mjg59@srcf.ucam.org>
To: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: linux-efi@vger.kernel.org, linux-kernel <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services
Date: Tue, 19 Mar 2013 18:28:10 +0000 [thread overview]
Message-ID: <20130319182810.GA13003@srcf.ucam.org> (raw)
In-Reply-To: <1363717411.2377.68.camel@dabdike.int.hansenpartnership.com>
On Tue, Mar 19, 2013 at 06:23:31PM +0000, James Bottomley wrote:
> The scheme we discussed, unless something radically changed, was to
> convey a temporary key pair via a mechanism to later verify the
> hybernate kernel on a resume. That only requires reboot safe knowledge
> of the public key. The private key can be conveyed in BS only (not NV),
> and should be consumed (as in deleted) by the OS when it receives it, so
> it wouldn't be exposed by this patch.
It requires the key to survive the system being entirely powered down,
which means it needs to be BS+NV. It shouldn't be possible for userspace
to access this key.
--
Matthew Garrett | mjg59@srcf.ucam.org
next prev parent reply other threads:[~2013-03-19 18:28 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-03-18 8:40 [PATCH] x86/efi: pull NV+BS variables out before we exit boot services James Bottomley
2013-03-18 8:40 ` James Bottomley
[not found] ` <1363596014.2412.8.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-19 1:48 ` Matthew Garrett
2013-03-19 1:48 ` Matthew Garrett
[not found] ` <20130319014850.GA28934-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org>
2013-03-19 8:14 ` James Bottomley
2013-03-19 8:14 ` James Bottomley
[not found] ` <1363680885.2377.11.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-19 16:35 ` Matthew Garrett
2013-03-19 16:35 ` Matthew Garrett
2013-03-19 17:17 ` James Bottomley
[not found] ` <1363713447.2377.60.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-19 17:25 ` Matthew Garrett
2013-03-19 17:25 ` Matthew Garrett
[not found] ` <20130319172506.GA11969-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org>
2013-03-19 18:23 ` James Bottomley
2013-03-19 18:23 ` James Bottomley
[not found] ` <1363717411.2377.68.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-19 18:28 ` Matthew Garrett [this message]
2013-03-19 18:28 ` Matthew Garrett
[not found] ` <20130319182810.GA13003-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org>
2013-03-19 18:40 ` James Bottomley
2013-03-19 18:40 ` James Bottomley
[not found] ` <1363718456.2377.71.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-19 18:50 ` Matthew Garrett
2013-03-19 18:50 ` Matthew Garrett
[not found] ` <20130319185003.GA13301-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org>
2013-03-19 23:00 ` James Bottomley
2013-03-19 23:00 ` James Bottomley
[not found] ` <1363734031.2377.77.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-19 23:17 ` Matthew Garrett
2013-03-19 23:17 ` Matthew Garrett
[not found] ` <20130319231756.GA21071-1xO5oi07KQx4cg9Nei1l7Q@public.gmane.org>
2013-03-20 8:00 ` James Bottomley
2013-03-20 8:00 ` James Bottomley
[not found] ` <1363766403.2373.3.camel-sFMDBYUN5F8GjUHQrlYNx2Wm91YjaHnnhRte9Li2A+AAvxtiuMwx3w@public.gmane.org>
2013-03-20 11:47 ` Matthew Garrett
2013-03-20 11:47 ` Matthew Garrett
2013-03-20 11:26 ` Matt Fleming
2013-03-20 11:26 ` Matt Fleming
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130319182810.GA13003@srcf.ucam.org \
--to=mjg59-1xo5oi07kqx4cg9nei1l7q@public.gmane.org \
--cc=James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org \
--cc=linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.