Re: [RFD] linux-firmware key arrangement for firmware signing

From: Petko Manolov
Date: Wed May 20 2015 - 12:09:59 EST


On 15-05-19 17:22:59, Luis R. Rodriguez wrote:
>
> I have a series of reasons find IMA unsuitable for the current goals at hand:
>
> 1) IMA is a pretty big kitchen sink, we want this to work well for
> even embedded systems, or architectures that do not have or require
> TPMs

No, it isn't. I've profiled it and performance hit is negligible. All hash
algorithms used have been optimized for most cpu architectures.

> 2) The appraisal is also done for to account for a specific state of
> affairs, you appraise to the user of the integrity of the system at a
> specific point in time, firmware signing can provide integrity /
> authorship vetting of files directly from the authors. In the case of
> regulatory.bin that was the whole point of it, and firmware signing as
> is being provided is intended to generalize that but by sharing code
> in-kernel with module signing infrastructure

This is weird English to me, but since i am no native speaker either i'll blame
myself. :) Could you please rephrase?

> If we go with IMA, I however do not think this would be appropriate and
> overkill at this point in time.

Depends on what your needs are. If you need authenticity then IMA-appraise is
definitely your way to go. For anything less secure you may go with LSM of
choice to apply whatever policy you may have in mind.

Again, security and convenience do not play well together.


Petko
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/