On Mon, Jun 27, 2022 at 7:59 AM Daniel P. Berrangé <berra...@redhat.com> wrote: > > On Mon, Jun 27, 2022 at 07:46:29AM -0400, Neal Gompa wrote: > > On Mon, Jun 27, 2022 at 4:49 AM Daniel P. Berrangé <berra...@redhat.com> > > wrote: > > > > > > On Sat, Jun 25, 2022 at 08:43:18PM -0400, Neal Gompa wrote: > > > > On Sat, Jun 25, 2022 at 4:14 PM Demi Marie Obenour > > > > <demioben...@gmail.com> wrote: > > > > > > > > > > On 6/25/22 07:56, Roberto Ragusa wrote: > > > > > > On 6/19/22 22:54, Sharpened Blade via devel wrote: > > > > > > > > > > > >> Use unified kernel images by default for new releases. This can > > > > > >> allow for the local installation to sign the kernel and the > > > > > >> initrd, so the boot chain can be verified until after the uefi. > > > > > > > > > > > > How big is the demand for this kind of lockdown? > > > > > > As a since-last-century Linux user, I'm choosing Fedora > > > > > > exactly to NOT have all this signing/trusted boot > > > > > > complications on my systems and I do not see a reason > > > > > > to turn Fedora into Android (or, worse, iOS). > > > > > It’s necessary for secure boot to actually be meaningful in > > > > > practice. I expect that people who care about secure boot > > > > > will want this. > > > > > > > > I don't. I only care about secure boot enough to bootstrap a Free > > > > platform. Secure Boot is generally not designed as a tool to provide > > > > security unless you rip out all the certs and use your own > > > > exclusively. At that point, you can do whatever you want. > > > > > > > > Most PCs are poorly designed to handle doing this procedure, and it's > > > > too easy to accidentally break the computer entirely by doing so. It's > > > > just not worth it. > > > > > > > > I treat Secure Boot purely as a compatibility interface. We need to do > > > > just enough to get through the secure boot environment. > > > > > > Many of the same issues & concepts from Secure Boot are involved in > > > confidential virtualization technology. This provides mechanism to > > > boot virtual machines on public cloud hosts, with strong protection > > > against a malicious host OS user snooping on what's going on in your > > > VM. You establish a trust relationship with the CPU hardware/firmware, > > > and once verified you can be confident the VM is booted with the guest > > > firmware, bootloader, kernel, initrd, cmdline that you deployed. This > > > will close one of the biggest security gaps between public cloud and > > > running on hardware you own & control yourself, so will be relevant > > > to anyone who uses cloud. Being able to improve kernel/initrd/cmdline > > > handling for SecureBoot will be beneficial for confidential computing, > > > and vica-verca. > > > > > > > That's flawed. As long as you don't control the hypervisor stack, you > > can't establish a trust relationship. Confidental computing is > > fundamentally broken in the public cloud because the public cloud > > provider can do whatever it wants to the hypervisor stack. If it was a > > private cloud infrastructure you ran, that's a different story. > > No, that is not the case, what you describe is the traditional > virtualizaton scenario, where hypervisor "root" is all-powerful > over everything, with no way to limit that that can be trusted by > guest owners. Confidential computing (for example AMD's SEV-SNP > or Intel TDX) is about using new CPU hardware & firmware features > to prevent the cloud provider from doing whatever they like. It > further provides a way for the guest owner to cryptographically > validate this is the case at boot time, such that the VM owner > can ensure it will not boot if the host admin tampered with the > requested execution environment. There is a decent overview of > threats that SEV-SNP aims to protect against here: > > > https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf >
Why are you assuming that can't be faked? We can fake secure enclaves for virtualization, there's no reason that can't be faked too. -- 真実はいつも一つ!/ Always, there's only one truth! _______________________________________________ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure