netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Jakub Kicinski <kuba@kernel.org>
To: "Szapar-Mudlaw, Martyna" <martyna.szapar-mudlaw@linux.intel.com>
Cc: netdev@vger.kernel.org, andrew+netdev@lunn.ch, horms@kernel.org,
	jiri@resnulli.us, stephen@networkplumber.org,
	anthony.l.nguyen@intel.com, jacob.e.keller@intel.com,
	przemyslaw.kitszel@intel.com, intel-wired-lan@lists.osuosl.org
Subject: Re: [RFC 0/1] Proposal for new devlink command to enforce firmware security
Date: Wed, 11 Dec 2024 18:11:47 -0800	[thread overview]
Message-ID: <20241211181147.09b4f8f3@kernel.org> (raw)
In-Reply-To: <b3b23f47-96d0-4cdc-a6fd-f7dd58a5d3c6@linux.intel.com>

On Wed, 11 Dec 2024 13:15:06 +0100 Szapar-Mudlaw, Martyna wrote:
> This patch does not aim to introduce a new security mechanism, rather, 

What I was referring to when I said "devlink doesn't have a suitable
security model" is that we have no definition of what security guarantees
we provide. Nothing in devlink is authenticated at all. 

Anti-rollback is fundamentally about preventing FW compromise.
How do you know that the FW is not compromised with devlink?

> it enables users to utilize the controller's existing functionality. 
> This feature is to provide users with a devlink interface to inform the 
> device that the currently loaded firmware can become the new minimal 
> version for the card. Users have specifically requested the ability to 
> make this step an independent part of their firmware update process.

I know, I've heard it for my internal users too. Vendors put some
"device is secure" checkbox and some SREs without security training
think that this is enough and should be supported by devlink.

> Leaving in-tree users without this capability exposes them to the risk 
> of downgrades to older, released by Intel, but potentially compromised 
> fw versions, and prevents the intended security protections of the 
> device from being utilized.
> On the other hand always enforcing this mechanism during firmware 
> update, could lead to poor customer experiences due to unintended 
> firmware behavior in specific workflows and is not accepted by Intel 
> customers.

Please point me to relevant standard that supports locking in security
revision as an action separate from FW update, and over an insecure
channel.

If you can't find one, please let's not revisit this conversation.

  parent reply	other threads:[~2024-12-12  2:11 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-12-09 13:14 [RFC 0/1] Proposal for new devlink command to enforce firmware security Martyna Szapar-Mudlaw
2024-12-09 13:14 ` [RFC 1/1] devlink: add new devlink lock-firmware command Martyna Szapar-Mudlaw
2024-12-09 23:36 ` [RFC 0/1] Proposal for new devlink command to enforce firmware security Jakub Kicinski
2024-12-11 12:15   ` Szapar-Mudlaw, Martyna
2024-12-11 14:16     ` Andrew Lunn
2024-12-12  2:11     ` Jakub Kicinski [this message]
2024-12-16 15:09       ` Przemek Kitszel
2024-12-16 15:53         ` Jakub Kicinski

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20241211181147.09b4f8f3@kernel.org \
    --to=kuba@kernel.org \
    --cc=andrew+netdev@lunn.ch \
    --cc=anthony.l.nguyen@intel.com \
    --cc=horms@kernel.org \
    --cc=intel-wired-lan@lists.osuosl.org \
    --cc=jacob.e.keller@intel.com \
    --cc=jiri@resnulli.us \
    --cc=martyna.szapar-mudlaw@linux.intel.com \
    --cc=netdev@vger.kernel.org \
    --cc=przemyslaw.kitszel@intel.com \
    --cc=stephen@networkplumber.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).