public inbox for kexec@lists.infradead.org
 help / color / mirror / Atom feed
From: Matthew Garrett <mjg@redhat.com>
To: Khalid Aziz <khalid@gonehiking.org>
Cc: Kees Cook <keescook@chromium.org>,
	horms@verge.net.au, Dave Young <dyoung@redhat.com>,
	kexec@lists.infradead.org,
	linux kernel mailing list <linux-kernel@vger.kernel.org>,
	Dmitry Kasatkin <dmitry.kasatkin@intel.com>,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	Roberto Sassu <roberto.sassu@polito.it>,
	Mimi Zohar <zohar@linux.vnet.ibm.com>,
	Vivek Goyal <vgoyal@redhat.com>
Subject: Re: Kdump with signed images
Date: Thu, 1 Nov 2012 16:23:15 +0000	[thread overview]
Message-ID: <20121101162315.GA13132@srcf.ucam.org> (raw)
In-Reply-To: <1351782656.3782.58.camel@rhapsody>

On Thu, Nov 01, 2012 at 09:10:56AM -0600, Khalid Aziz wrote:
> On Thu, 2012-11-01 at 14:57 +0000, Matthew Garrett wrote:
> > On Thu, Nov 01, 2012 at 10:51:49AM -0400, Vivek Goyal wrote:
> > 
> > > And if one wants only /sbin/kexec to call it, then just sign that
> > > one so no other executable will be able to call kexec_load(). Though
> > > I don't think that's the requirement here. Requirement is that only
> > > trusted executables should be able to call kexec_load().
> > 
> > Where "trusted executables" means "signed by a key that's present in the 
> > system firmware or in the kernel that's signed with a key that's present 
> > in the system firmware", sure.
> > 
> 
> This is starting to sound too restrictive (even though I understand the
> rationale behind the restrictions). Does this allow for a custom
> userspace application that among other things also can kexec_load() a
> new kernel and boot it, for example a customer unique health monitoring
> app that reboots the system if things are not looking right on the
> running system?

Only if it's signed with a key that the kernel trusts.

> How would a customer go about getting that userspace binary signed and 
> re-signed every time they update their app? There is the option of 
> turning the whole SecureBoot thing off for a system like that but let 
> us assume customer wants to leave that on or does not have the option 
> to turn it off?

There's ongoing work for providing mechanisms for trusting user keys. If 
you want Secure Boot turned on, you don't want any untrusted code 
running in your kernel. If you're happy with untrusted code in your 
kernel, why are you using Secure Boot?

-- 
Matthew Garrett | mjg59@srcf.ucam.org

_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec

  reply	other threads:[~2012-11-01 16:35 UTC|newest]

Thread overview: 84+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-10-18  3:10 [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting Dave Young
2012-10-18 14:56 ` Khalid Aziz
2012-10-18 19:11   ` Vivek Goyal
2012-10-18 19:22     ` Khalid Aziz
2012-10-18 19:38       ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Vivek Goyal
2012-10-18 19:55         ` Matthew Garrett
2012-10-18 22:25         ` Eric W. Biederman
2012-10-19  2:06           ` Vivek Goyal
2012-10-19  3:36             ` Eric W. Biederman
2012-10-19 14:31               ` Vivek Goyal
2012-10-22 20:43                 ` Vivek Goyal
2012-10-22 21:11                   ` Eric W. Biederman
2012-10-23  2:04                   ` Simon Horman
2012-10-23 13:24                     ` Vivek Goyal
2012-10-23 16:26                       ` [RFC] Kdump with signed images Eric W. Biederman
2012-10-23 17:39                         ` Vivek Goyal
2012-10-23 19:11                           ` Maxim Uvarov
2012-10-23 19:16                             ` Vivek Goyal
2012-10-22 21:07                 ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Eric W. Biederman
2012-10-23 13:18                   ` Vivek Goyal
2012-10-23 14:59                     ` Vivek Goyal
2012-10-23 15:41                       ` Matthew Garrett
2012-10-23 16:44                         ` [RFC] Kdump with signed images Eric W. Biederman
2012-10-23 16:52                           ` Matthew Garrett
2012-10-24 17:19                           ` Vivek Goyal
2012-10-25  5:43                             ` Mimi Zohar
2012-10-25  6:44                               ` Kees Cook
2012-10-25  7:01                                 ` Mimi Zohar
2012-10-25 13:54                               ` Vivek Goyal
2012-10-25 19:06                                 ` Mimi Zohar
2012-10-25 15:39                         ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Vivek Goyal
2012-10-23 16:19                       ` Kdump with signed images Eric W. Biederman
2012-10-23 16:31                         ` Matthew Garrett
2012-10-23 17:03                           ` Eric W. Biederman
2012-10-23 17:09                             ` Matthew Garrett
2012-10-24 17:36                         ` Vivek Goyal
2012-10-25  6:10                           ` Mimi Zohar
2012-10-25 14:10                             ` Vivek Goyal
2012-10-25 18:40                               ` Mimi Zohar
2012-10-25 18:55                                 ` Vivek Goyal
2012-10-26  1:15                                   ` Mimi Zohar
2012-10-26  2:39                                     ` Matthew Garrett
2012-10-26  3:30                                       ` Eric W. Biederman
2012-10-26 17:06                                       ` Vivek Goyal
2012-10-26 18:37                                         ` Mimi Zohar
2012-11-01 13:10                                           ` Vivek Goyal
2012-11-01 13:53                                             ` Vivek Goyal
2012-11-01 14:29                                               ` Mimi Zohar
2012-11-01 14:43                                                 ` Vivek Goyal
2012-11-01 14:52                                                   ` Matthew Garrett
2012-11-02 13:23                                                     ` Vivek Goyal
2012-11-02 14:29                                                       ` Balbir Singh
2012-11-02 14:36                                                         ` Vivek Goyal
2012-11-03  3:02                                                           ` Balbir Singh
2012-11-02 21:34                                                         ` H. Peter Anvin
2012-11-02 21:32                                                       ` Eric W. Biederman
2012-11-05 18:03                                                         ` Vivek Goyal
2012-11-05 19:44                                                           ` Eric W. Biederman
2012-11-05 20:42                                                             ` Vivek Goyal
2012-11-05 23:01                                                               ` H. Peter Anvin
2012-11-06 19:34                                                             ` Vivek Goyal
2012-11-06 23:51                                                               ` Eric W. Biederman
2012-11-08 19:40                                                                 ` Vivek Goyal
2012-11-08 19:45                                                                   ` Vivek Goyal
2012-11-08 21:03                                                                     ` Eric W. Biederman
2012-11-09 14:39                                                                       ` Vivek Goyal
2012-11-15  5:09                                                                         ` Eric W. Biederman
2012-11-15 12:56                                                                           ` Mimi Zohar
2012-11-08 20:46                                                                   ` Mimi Zohar
2012-11-01 14:51                                                 ` Vivek Goyal
2012-11-01 14:57                                                   ` Matthew Garrett
2012-11-01 15:10                                                     ` Khalid Aziz
2012-11-01 16:23                                                       ` Matthew Garrett [this message]
2012-11-02 16:57                                                         ` Khalid Aziz
2012-10-26 17:59                                       ` Mimi Zohar
2012-10-26 18:19                                         ` Matthew Garrett
2012-10-26 18:25                                           ` Mimi Zohar
2012-10-23 15:51                     ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Eric W. Biederman
2012-10-23 17:18                       ` Vivek Goyal
2012-10-19 17:53               ` Vivek Goyal
2012-10-22 21:15                 ` Eric W. Biederman
2012-11-02 21:36                   ` H. Peter Anvin
2012-11-05 18:11                     ` Vivek Goyal
2012-11-05 19:54                       ` Eric W. Biederman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121101162315.GA13132@srcf.ucam.org \
    --to=mjg@redhat.com \
    --cc=dmitry.kasatkin@intel.com \
    --cc=dyoung@redhat.com \
    --cc=ebiederm@xmission.com \
    --cc=horms@verge.net.au \
    --cc=hpa@zytor.com \
    --cc=keescook@chromium.org \
    --cc=kexec@lists.infradead.org \
    --cc=khalid@gonehiking.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=roberto.sassu@polito.it \
    --cc=vgoyal@redhat.com \
    --cc=zohar@linux.vnet.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox