Re: Discussion about using NV indexes for kernel properties like localities and PCRs

2023-12-01 Thread Lennart Poettering
;name" of the nvindex would change, and it would become useless in all references from other objects/quotes/… This logic is explicitly mentioned in that tpm book btw, it took me a while to grok how great that concept is, since it basically means you don't have to be concerned about removed/readded nvindexes at all. Lennart -- Lennart Poettering, Berlin

Re: Discussion about using NV indexes for kernel properties like localities and PCRs

2023-12-04 Thread Lennart Poettering
e PCRs" and the above is basically what I had in mind to implement that. But admittedly I am talking a bit out of my ass here, since I did not in fact implement the above. But I don't see why it wouldn't work. > > This logic is explicitly mentioned in that tpm book btw, it took me a > > while to grok how great that concept is, since it basically means you > > don't have to be concerned about removed/readded nvindexes at all. > > Which TPM book is this? "A practical guide to TPM 2.0". The one that always shows up in your google searches... Lennart -- Lennart Poettering, Berlin

Re: Discussion about using NV indexes for kernel properties like localities and PCRs

2023-12-04 Thread Lennart Poettering
On Mo, 04.12.23 08:01, James Bottomley (james.bottom...@hansenpartnership.com) wrote: > On Mon, 2023-12-04 at 10:20 +0100, Lennart Poettering wrote: > > On Fr, 01.12.23 17:23, James Bottomley > > (james.bottom...@hansenpartnership.com) wrote: > [...] > > > > > I&

[PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"

2025-03-20 Thread Lennart Poettering
if (!mokx) { if (status == EFI_NOT_FOUND) -- 2.48.1 Lennart -- Lennart Poettering, Berlin

Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"

2025-04-05 Thread Lennart Poettering
On Fr, 21.03.25 15:13, lee joey (joeyli.ker...@gmail.com) wrote: > Hi Lennart, > > Lennart Poettering 於 2025年3月20日 週四 下午8:02寫道: > > > > This reverts commit 92ad19559ea9a8ec6f158480934ae26ebfe2c14f. > > > > This original commit this reverts creates a stran

Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"

2025-07-03 Thread Lennart Poettering
o get them there, then their security value is kinda weak anyway, because the allowlist that the keyring is is such an extremely wide net, it's at best a denylist of bad stuff rather than an allowlist of good stuff at this point. It's kinda undemocratic too. But anyway, the pros and cons of SB are another discussion. I am primarily interested in making it optional, so that you can get security with SB and without SB, because you always have someting to protect the boot, and always something that protects the rest. Lennart -- Lennart Poettering, Berlin

Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"

2025-07-03 Thread Lennart Poettering
On Mi, 02.07.25 21:40, Mimi Zohar (zo...@linux.ibm.com) wrote: > On Thu, 2025-03-20 at 13:02 +0100, Lennart Poettering wrote: > > This reverts commit 92ad19559ea9a8ec6f158480934ae26ebfe2c14f. > > > > This original commit this reverts creates a strange situation: it > &g

Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"

2025-07-04 Thread Lennart Poettering
ic device that sprinkles "trust" magic dust on things: you have to define your objects with a policy that locks down access based on attestation, pins or other stuff, and it's just not obvious what that should be here for such a kernel keyring. Sorry, but this all seems backwards to me: what you propose weakens the current model afaics, and you insist to be strict in the case where an explicit request has been made to relax things by turning off SB. Lennart -- Lennart Poettering, Berlin

Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"

2025-07-04 Thread Lennart Poettering
Linux then does the opposite, invents some artificial checks not even done if SB is on! I mean, a boot trust chain means: trust what comes before, and authenticate/measure what comes next before you pass control to it. But for some reason Linux makes up a different model, where if told to not authent