On Mon, Jun 27, 2022 at 4:49 AM Daniel P. Berrangé <berra...@redhat.com> wrote: > > On Sat, Jun 25, 2022 at 08:43:18PM -0400, Neal Gompa wrote: > > On Sat, Jun 25, 2022 at 4:14 PM Demi Marie Obenour > > <demioben...@gmail.com> wrote: > > > > > > On 6/25/22 07:56, Roberto Ragusa wrote: > > > > On 6/19/22 22:54, Sharpened Blade via devel wrote: > > > > > > > >> Use unified kernel images by default for new releases. This can allow > > > >> for the local installation to sign the kernel and the initrd, so the > > > >> boot chain can be verified until after the uefi. > > > > > > > > How big is the demand for this kind of lockdown? > > > > As a since-last-century Linux user, I'm choosing Fedora > > > > exactly to NOT have all this signing/trusted boot > > > > complications on my systems and I do not see a reason > > > > to turn Fedora into Android (or, worse, iOS). > > > It’s necessary for secure boot to actually be meaningful in > > > practice. I expect that people who care about secure boot > > > will want this. > > > > I don't. I only care about secure boot enough to bootstrap a Free > > platform. Secure Boot is generally not designed as a tool to provide > > security unless you rip out all the certs and use your own > > exclusively. At that point, you can do whatever you want. > > > > Most PCs are poorly designed to handle doing this procedure, and it's > > too easy to accidentally break the computer entirely by doing so. It's > > just not worth it. > > > > I treat Secure Boot purely as a compatibility interface. We need to do > > just enough to get through the secure boot environment. > > Many of the same issues & concepts from Secure Boot are involved in > confidential virtualization technology. This provides mechanism to > boot virtual machines on public cloud hosts, with strong protection > against a malicious host OS user snooping on what's going on in your > VM. You establish a trust relationship with the CPU hardware/firmware, > and once verified you can be confident the VM is booted with the guest > firmware, bootloader, kernel, initrd, cmdline that you deployed. This > will close one of the biggest security gaps between public cloud and > running on hardware you own & control yourself, so will be relevant > to anyone who uses cloud. Being able to improve kernel/initrd/cmdline > handling for SecureBoot will be beneficial for confidential computing, > and vica-verca. >
That's flawed. As long as you don't control the hypervisor stack, you can't establish a trust relationship. Confidental computing is fundamentally broken in the public cloud because the public cloud provider can do whatever it wants to the hypervisor stack. If it was a private cloud infrastructure you ran, that's a different story. -- 真実はいつも一つ!/ Always, there's only one truth! _______________________________________________ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure