Re: Plan of action for Secure Boot support

2014-08-20 Thread Paul R. Tagliamonte
Perhaps we should find time to hack at DebConf -T On Tue, Aug 19, 2014 at 5:16 PM, Steve McIntyre wrote: > On Tue, Aug 19, 2014 at 01:38:44PM -0700, Ben Hutchings wrote: >> >>So far as I know, no progress has been made on the above steps or any >>alternate approach. > > Ditto, I've not seen (or

Re: Plan of action for Secure Boot support

2014-08-19 Thread Steve McIntyre
On Tue, Aug 19, 2014 at 01:38:44PM -0700, Ben Hutchings wrote: > >So far as I know, no progress has been made on the above steps or any >alternate approach. Ditto, I've not seen (or done) anything about this. -- Steve McIntyre, Cambridge, UK.st...@einval.com Mat

Re: Plan of action for Secure Boot support

2014-08-19 Thread Ben Hutchings
On Thu, 2014-08-14 at 23:38 +0200, Cyril Brulebois wrote: [...] > > 1. Colin Watson will prepare dak changes to support upload and > > subsequent signing of EFI executables. (This is an embedded, not > > detached, signature.) > > > > 2. Steve Langasek will prepare and upload a package of the 'shi

Re: Plan of action for Secure Boot support

2014-08-14 Thread Cyril Brulebois
Hi Ben, Ben Hutchings (2013-08-13): > Colin Watson and Stefano Rivera talked about how Ubuntu had implemented > Secure Boot and what they believed were the requirements. > > Apparently, the Secure Boot spec requires each stage of the boot code > to validate signatures only until ExitBootServices

Re: Plan of action for Secure Boot support

2014-05-25 Thread Florian Weimer
* Colin Watson: > On Wed, Jan 08, 2014 at 08:31:11AM +0100, Florian Weimer wrote: >> Furthermore, we need to store the keys for all EV certificates (both >> the certificate used for submission, and the certificate embedded in >> the shim) in devices that meet at least FIPS 140 Level 2. Such >> de

Re: Plan of action for Secure Boot support

2014-01-08 Thread Florian Weimer
* Ben Hutchings: >> The Terms & Conditions of existing EV code-signing CAs do not permit a >> code-signing end-entity certificate to be used for signing another >> certificate, so we'd directly have to embed the end-entity certificate >> used to sign GRUB and the kernel into the shim—or we'd have

Re: Plan of action for Secure Boot support

2014-01-08 Thread Ben Hutchings
On Wed, 2014-01-08 at 08:31 +0100, Florian Weimer wrote: > * Ben Hutchings: > > > However, there is now a blog post from Microsoft that supports what > > Matthew Garrett has been saying for a while - they may revoke the > > signature on a boot loader if signature verification is not extended to >

Re: Plan of action for Secure Boot support

2014-01-08 Thread Colin Watson
On Wed, Jan 08, 2014 at 08:31:11AM +0100, Florian Weimer wrote: > Furthermore, we need to store the keys for all EV certificates (both > the certificate used for submission, and the certificate embedded in > the shim) in devices that meet at least FIPS 140 Level 2. Such > devices that are affordab

Re: Plan of action for Secure Boot support

2014-01-07 Thread Florian Weimer
* Ben Hutchings: > However, there is now a blog post from Microsoft that supports what > Matthew Garrett has been saying for a while - they may revoke the > signature on a boot loader if signature verification is not extended to > the kernel, including any mechanism to chain-load another kernel: >

Re: Plan of action for Secure Boot support

2013-12-09 Thread Ben Hutchings
On Tue, 2013-08-13 at 22:54 +0200, Ben Hutchings wrote: [...] > Apparently, the Secure Boot spec requires each stage of the boot code to > validate signatures only until ExitBootServices() is called. (At this > point the firmware makes some parts of its non-volatile configuration > inaccessible.)

Re: Plan of action for Secure Boot support

2013-08-14 Thread Bastian Blank
On Wed, Aug 14, 2013 at 12:30:55AM +0200, Ben Hutchings wrote: > Editing of binary packages is icky, so that's not part of the plan. > Instead, after dak signs an executable, the package maintainer downloads > and copies those into a separate 'source' package, which has a trivial > debian/rules. (

Re: Plan of action for Secure Boot support

2013-08-13 Thread Ben Hutchings
On Tue, 2013-08-13 at 23:38 +0200, Cyril Brulebois wrote: [...] > > 4. The kernel team may also need to upload kernel images for signing and > > add linux-image-signed packages with the Debian-signed kernel images. > > This is because some quirks in the kernel should be run before calling > > Exit

Re: Plan of action for Secure Boot support

2013-08-13 Thread Joey Hess
Cyril Brulebois wrote: > (Sorry, I'm new to all this) do you mean (1) the regular linux image > packages are getting a signature added, and we're using those like we do > today, or (2) that we'll have additional linux image packages with the > signatures to be used instead of the usual linux image

Re: Plan of action for Secure Boot support

2013-08-13 Thread Cyril Brulebois
Hi, many thanks for the summary. Ben Hutchings (2013-08-13): > Colin Watson and Stefano Rivera talked about how Ubuntu had implemented > Secure Boot and what they believed were the requirements. > > Apparently, the Secure Boot spec requires each stage of the boot code to > validate signatures o

Re: Plan of action for Secure Boot support

2013-08-13 Thread Ben Hutchings
On Tue, 2013-08-13 at 22:54 +0200, Ben Hutchings wrote: > Colin Watson and Stefano Rivera talked about how Ubuntu had implemented > Secure Boot and what they believed were the requirements. [...] Sorry, I'm having name confusion here. Who do I really mean? Ben. -- Ben Hutchings Experience is w

Plan of action for Secure Boot support

2013-08-13 Thread Ben Hutchings
Colin Watson and Stefano Rivera talked about how Ubuntu had implemented Secure Boot and what they believed were the requirements. Apparently, the Secure Boot spec requires each stage of the boot code to validate signatures only until ExitBootServices() is called. (At this point the firmware makes