From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx3-rdu2.redhat.com ([66.187.233.73]:40344 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1756678AbeEATAt (ORCPT ); Tue, 1 May 2018 15:00:49 -0400 From: David Howells In-Reply-To: References: <26787.1519902415@warthog.procyon.org.uk> To: Matthew Garrett , Mimi Zohar Cc: dhowells@redhat.com, linux-integrity , Ben Hutchings Subject: Re: linux-next: UEFI Secure boot lockdown patchset MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Tue, 01 May 2018 20:00:47 +0100 Message-ID: <8106.1525201247@warthog.procyon.org.uk> Sender: linux-integrity-owner@vger.kernel.org List-ID: Matthew Garrett wrote: > (a) seems unnecessary, and (b) isn't possible in most distributions > (there's ongoing work in Debian, but it's not merged yet). I can see cases > where you'd want to enforce this via IMA, but I don't think it's > appropriate for all cases. Should the use of the IMA secure_boot policy be > gated behind a config option? Quite probably. Mimi? David