TOMOYO's pull request for v6.12

Paul Moore paul at paul-moore.com
Sat Oct 5 16:30:17 UTC 2024


On Sat, Oct 5, 2024 at 3:11 AM Tetsuo Handa
<penguin-kernel at i-love.sakura.ne.jp> wrote:
> I think that this pull request succeeded in revealing what LSM community thinks.
> Each developer is thinking different things. One thinks "anyone can rebuild kernels
> with whatever changes", but that opinion ignored secure boot / module signing part.

As I believe that I'm the developer quoted above, let me say that my
comment did not ignore UEFI SB.  The Machine Owner Key (MOK) concept
provided by shims/bootloaders is designed just for this use case.
More advanced users can even replace the UEFI SB key databases, on
hardware that supports it, with their own to permit loading of their
self-built kernels without the need for the MOK; this is arguably one
of the most "secure" UEFI SB configurations.

I've successfully used MOK on my own systems to support my own kernel
builds, and I've successfully replaced the UEFI SB key databases in
VMs to use UEFI SB and my own kernel builds without MOK.

-- 
paul-moore.com



More information about the Linux-security-module-archive mailing list