public inbox for u-boot@lists.denx.de
 help / color / mirror / Atom feed
From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: u-boot@lists.denx.de
Subject: [PATCH 1/4] tools: mkeficapsule: add firmwware image signing
Date: Fri, 14 May 2021 16:13:56 +0900	[thread overview]
Message-ID: <20210514071356.GA28950@laputa> (raw)
In-Reply-To: <75d6f7c5-5300-4abc-3c78-02dc062f094c@gmx.de>

On Fri, May 14, 2021 at 08:59:38AM +0200, Heinrich Schuchardt wrote:
> On 5/14/21 8:19 AM, AKASHI Takahiro wrote:
> > On Thu, May 13, 2021 at 08:25:56PM +0200, Heinrich Schuchardt wrote:
> > > On 5/13/21 10:18 AM, Masami Hiramatsu wrote:
> > > > 2021?5?13?(?) 16:24 AKASHI Takahiro <takahiro.akashi@linaro.org>:
> > > > 
> > > > > > > > > BTW, IMHO, if u-boot.bin can not find the ESL in the device tree,
> > > > > > > > > it should skip authentication too.
> > > > > > > > 
> > > > > > > > In this case the capsule should be rejected (if
> > > > > > > > CONFIG_EFI_CAPSULE_AUTHENTICATE=y).
> > > > > > > 
> > > > > > > That's basically right.
> > > > > > > But as I mentioned in my comment against Sughosh's patch,
> > > > > > > the authentication process will be enforced only if the capsule has
> > > > > > > an attribute, IMAGE_ATTRIBUTE_AUTHENTICATION_REQUIRED.
> > > > > > > 
> > > > > > 
> > > > > > That would be a security desaster.
> > > > > 
> > > > > The requirement that I mentioned above is clearly described
> > > > > in UEFI specification.
> > > > > If you think that it is a disaster, please discuss the topic
> > > > > in UEFI Forum first.
> > > > 
> > > > I confirmed UEFI specification, version 2.7, Section.23.1
> > > > the last of EFI_FIRMWARE_MANAGEMENT_PROTOCOL.GetImageInfo()
> > > > 
> > > > -----------------
> > > > If IMAGE_ATTRIBUTE_AUTHENTICATION_REQUIRED is supported and clear, then
> > > > authentication is not required to perform the firmware image operations.
> > > > -----------------
> > > 
> > > IMAGE_ATTRIBUTE_AUTHENTICATION_REQUIRED bit is a property of the FMP driver.
> > 
> > Yes, it is. But if the attribute is not changeable at all,
> > why do we need this flag?
> > Why does a "firmware image descriptor" hold two distinct
> > member fields, "AttributesSupported" and "AttributesSetting"?
> > What does "Setting" mean? Who sets what, and when?
> 
> "Setting" means value here. None of these flags is set by the user. It
> is the FMP driver that keeps track of the update state and sets the
> flags accordingly.
> 
> AttributesSupported indicates which bits in AttributesSetting contain
> accurate information:
> 
> E.g for IMAGE_ATTRIBUTE_IN_USE
> 
> AttributesSupported | AttributesSetting | Meaning
> --------------------+-------------------+--------------------
> 0                   | 0                 | state is unknown
> 0                   | 1                 | state is unknown
> 1                   | 0                 | image is not in use
> 1                   | 1                 | image is in use

We are discussing *_REQUIRED.
Can you give me the same table for *_REQUIRED?

-Takahiro Akashi


> Some bits indicate a property of the installed image, e.g.
> IMAGE_ATTRIBUTE_UEFI_IMAGE.
> 
> Some bits indicate a system state. E.g. IMAGE_ATTRIBUTE_IN_USE indicates
> if the information reported by the FMP driver is for the currently used
> image. This bit might be 0 in AttributesSetting if you have not yet
> executed a reset after installing the new image and 1 after the reset.
> 
> Best regards
> 
> Heinrich
> > > 
> > > > 
> > > > Oh, this is really crazy because deciding whether to authenticate the
> > > > suspicious
> > > > package or not, depends on whether the package said "please
> > > > authenticate me" or not. :D
> > > > 
> > > > Anyway, since this behavior follows the specification, it should be
> > > > kept by default,
> > > > but also IMHO, there should be a CONFIG option to enforce capsule
> > > > authentication always.
> > > > 
> > > > Thank you,
> > > > 
> > > > 
> > > > 
> > > 
> 

  reply	other threads:[~2021-05-14  7:13 UTC|newest]

Thread overview: 55+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-05-12  4:57 [PATCH 0/4] efi_loader: capsule: improve capsule authentication support AKASHI Takahiro
2021-05-12  4:57 ` [PATCH 1/4] tools: mkeficapsule: add firmwware image signing AKASHI Takahiro
2021-05-12  8:56   ` Heinrich Schuchardt
2021-05-13  3:08     ` AKASHI Takahiro
2021-05-13  4:22       ` Heinrich Schuchardt
2021-05-13  5:00         ` AKASHI Takahiro
2021-05-13  5:35           ` Heinrich Schuchardt
2021-05-13  6:36             ` AKASHI Takahiro
2021-05-13  6:45               ` Heinrich Schuchardt
2021-05-13  7:45                 ` AKASHI Takahiro
2021-05-13  5:12         ` Masami Hiramatsu
2021-05-13  5:50           ` Heinrich Schuchardt
2021-05-13  6:44             ` Masami Hiramatsu
2021-05-13  6:52               ` Heinrich Schuchardt
2021-05-13  7:38                 ` AKASHI Takahiro
2021-05-13  6:50             ` AKASHI Takahiro
2021-05-13  6:55               ` Heinrich Schuchardt
2021-05-13  7:23                 ` AKASHI Takahiro
2021-05-13  8:18                   ` Masami Hiramatsu
2021-05-13  8:38                     ` AKASHI Takahiro
2021-05-13 10:27                       ` Ilias Apalodimas
2021-05-13 16:12                         ` Masami Hiramatsu
2021-05-13 16:32                           ` Heinrich Schuchardt
2021-05-13 16:42                             ` Ilias Apalodimas
2021-05-14  4:50                               ` AKASHI Takahiro
2021-05-14  7:56                                 ` Ilias Apalodimas
2021-05-14  4:13                             ` AKASHI Takahiro
2021-05-13 10:40                       ` Heinrich Schuchardt
2021-05-13 18:25                     ` Heinrich Schuchardt
2021-05-14  6:19                       ` AKASHI Takahiro
2021-05-14  6:59                         ` Heinrich Schuchardt
2021-05-14  7:13                           ` AKASHI Takahiro [this message]
2021-05-14  8:45                             ` Heinrich Schuchardt
2021-05-14  9:51                               ` AKASHI Takahiro
2021-05-14 10:08                                 ` Heinrich Schuchardt
2021-05-14 13:09                                 ` Masami Hiramatsu
2021-05-14 13:39                                   ` Ilias Apalodimas
2021-05-15  2:03                                   ` Heinrich Schuchardt
2021-05-15  2:14                                     ` Masami Hiramatsu
2021-05-12  4:57 ` [PATCH 2/4] tools: mkeficapsule: remove device-tree related operation AKASHI Takahiro
2021-05-12  7:20   ` Ilias Apalodimas
2021-05-12  7:49     ` Masami Hiramatsu
2021-05-12  8:01       ` Ilias Apalodimas
2021-05-12 10:01         ` Heinrich Schuchardt
2021-05-13  2:33           ` AKASHI Takahiro
2021-05-13  5:08             ` Heinrich Schuchardt
2021-05-13  7:13               ` AKASHI Takahiro
2021-05-13 17:42                 ` Heinrich Schuchardt
2021-05-14  2:21                   ` [PATCH 2/4] tools: mkeficapsule: remove device-tree related operationy AKASHI Takahiro
2021-05-14  2:23                   ` [PATCH 2/4] tools: mkeficapsule: remove device-tree related operation Masami Hiramatsu
2021-05-12  4:57 ` [PATCH 3/4] tools: add fdtsig command AKASHI Takahiro
2021-05-13  5:23   ` Heinrich Schuchardt
2021-05-13  7:03     ` AKASHI Takahiro
2021-05-12  4:57 ` [PATCH 4/4] test/py: efi_capsule: add image authentication test AKASHI Takahiro
2021-05-12  5:04 ` [PATCH 0/4] efi_loader: capsule: improve capsule authentication support Heinrich Schuchardt

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210514071356.GA28950@laputa \
    --to=takahiro.akashi@linaro.org \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox