From: Wolfgang Denk <wd@denx.de>
To: u-boot@lists.denx.de
Subject: [U-Boot] efi_loader: implementing non-volatile UEFI variables
Date: Fri, 28 Jun 2019 09:26:06 +0200 [thread overview]
Message-ID: <20190628072606.8439C240085@gemini.denx.de> (raw)
In-Reply-To: <20190627051518.GB19527@linaro.org>
Dear Takahiro,
In message <20190627051518.GB19527@linaro.org> you wrote:
>
> In UEFI environment, *not* all the variables are to be authenticated,
> but just a few. The signature verification for such "authenticated"
> variables should be done *per* variable.
I see.
> * authenticated variables can only be updated via UEFI API,
> SetVariable(u16 *variable_name,
> const efi_guid_t *vendor, u32 attributes,
> efi_uintn_t data_size, const void *data);
> where data must have been already formatted as I explained above.
> * All UEFI does here are:
> - decode data and retrieve a signature
> - verify this signature with one of certificates in "db"
Do I understand correctly that the user who wants to change the
value of such a authenticated variable, has to provide both the
value plus the signature through the user interface?
> So preparing data for authenticated variables are totally up to
> users, and U-Boot doesn't have to know about any private keys for signing.
> Once the system is properly constructed and installed with right
> cerficates, we will be able to store keys offline.
Understood. Thanks for the explanation.
> That is the reason why I think b) is an orthogonal issue.
> Anyhow, there expected to be lots of platforms where users want to use
> UEFI U-Boot without requiring secure boot. Even on such platforms,
> my patch will provide more UEFI-compliant semantics of UEFI variables.
This is ok with me. But if this is really orthogonal, then it
should be so also code-wise. I don't like such intrusive
modifications of the U-Boot environment code for purposes that have
nothing to do with U-Boot environment variables.
Either we store in (in the simple, non-secure) case UEFI variables a
spart of the environment (see my proposal), then we don;t need your
patches. Or you provide a separate UEFI data storage solution
(which may be configred with or without secure boot support), but
then this should be completely separate from the environment code.
Thanks!
Wolfgang Denk
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
Phone: (+49)-8142-66989-10 Fax: (+49)-8142-66989-80 Email: wd at denx.de
God made machine language; all the rest is the work of man.
prev parent reply other threads:[~2019-06-28 7:26 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-20 8:06 [U-Boot] efi_loader: implementing non-volatile UEFI variables Heinrich Schuchardt
2019-06-20 8:30 ` Ilias Apalodimas
2019-06-24 10:23 ` Wolfgang Denk
2019-06-24 17:57 ` Heinrich Schuchardt
2019-06-24 18:50 ` Wolfgang Denk
2019-06-24 19:10 ` Heinrich Schuchardt
2019-06-25 1:10 ` AKASHI Takahiro
2019-06-25 4:41 ` Heinrich Schuchardt
2019-06-25 6:33 ` Wolfgang Denk
2019-06-25 7:59 ` AKASHI Takahiro
2019-06-25 9:11 ` Wolfgang Denk
2019-06-26 5:26 ` AKASHI Takahiro
2019-06-26 9:18 ` Wolfgang Denk
2019-06-25 5:56 ` Wolfgang Denk
2019-06-25 9:11 ` Ilias Apalodimas
2019-06-25 9:27 ` Wolfgang Denk
2019-06-26 7:37 ` Ilias Apalodimas
2019-06-26 9:44 ` Wolfgang Denk
2019-06-27 5:15 ` AKASHI Takahiro
2019-06-27 7:08 ` Ilias Apalodimas
2019-06-28 7:34 ` Wolfgang Denk
2019-06-28 7:26 ` Wolfgang Denk [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190628072606.8439C240085@gemini.denx.de \
--to=wd@denx.de \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox