From owner-freebsd-virtualization@freebsd.org Mon Oct 14 19:18:31 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 34B3E1349B4; Mon, 14 Oct 2019 19:18:31 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: from mail-ua1-x943.google.com (mail-ua1-x943.google.com [IPv6:2607:f8b0:4864:20::943]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46sSyZ2xxlz3Gxf; Mon, 14 Oct 2019 19:18:30 +0000 (UTC) (envelope-from clay.daniels.jr@gmail.com) Received: by mail-ua1-x943.google.com with SMTP id r19so5313844uap.9; Mon, 14 Oct 2019 12:18:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Gz9cgMHiiw0wJ5m7+flRU30EhwdWMFKdcrP7eM/S6K8=; b=KUdFAfDWRpZFbgsnAahNGKjEtTMnqx/RsNL4CrrORJ+3MoK6/y/mOzS3qkwnmgemSV VUehAAkwzpKkLZ7gORYDHXI6IngoaMUM94Uzlvlg6Sx5kbiRK6H/YCutL4TR5FxWc+hj Ypr+UoWciOkE8OIA/sdyvTmxm1IflhoiRrJqIup4CTrmNNMAWA2mbg43Q9G80bCDQeHU ACw4elO1Rh8nRxBtKHGThcD5trun0bvde0V9puU1/jIksVrPjFPZRa/xwONoDhC13EMY wguOLkbg1wMCx0mvtd2GErLc6RClonS1VlBJ6unPYR4/trNfvS73IMRFcFVwXwnmaA4a uf6A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Gz9cgMHiiw0wJ5m7+flRU30EhwdWMFKdcrP7eM/S6K8=; b=l6TuJog9KOqNuYzs3KbLsof3zpGmNaHOhivb22X17CQOVBJm+LQTRu0YKFGHPv2yx3 L1q4Eohsj8V05Qwsy9UNY5KsZHfkqU5fNgeut5ncJyR9Oa/rGdTKpLDLNPiGYuarbSDe wp5u1s3IAfnnBHtVvKZ//UBTCe/DFzvMko1sxUGTXD91T2lv/jJcZWfDlyntK6TUNWaF vTZugYdkmS16WDnehe3uEt6oyC+fQt9y8Kf9p1tk8Vd3eW/QsmboO2xgP8tBkw+hFf+P 81iEN8jXWN80sgkV0IQrZFZ7X6o0mW0ES/bFypTHYvekEJY2xGxDSGU3MiIOQdEBcOOU 9LSw== X-Gm-Message-State: APjAAAU0omTK7BCM7xGImmhpQpNAHlwL6qN4W7PoGPmjod22dWfgj2eR KxTwenTFNhXMjpEePM5q9FXU+FQ64ymK94OqAA== X-Google-Smtp-Source: APXvYqwKi9x3tUPCGqIKAVHB8t2WQ38cy0DLw7YFCW8Mxapb2m0hIwANnWQjUgmXWJ3OK/IO/3o72emQKAMmD0Dnfu0= X-Received: by 2002:ab0:7451:: with SMTP id p17mr8969505uaq.18.1571080708946; Mon, 14 Oct 2019 12:18:28 -0700 (PDT) MIME-Version: 1.0 References: <76102.1571079149@kaos.jnpr.net> In-Reply-To: <76102.1571079149@kaos.jnpr.net> From: "Clay Daniels Jr." Date: Mon, 14 Oct 2019 14:18:18 -0500 Message-ID: Subject: Re: AMD Secure Encrypted Virtualization - FreeBSD Status? To: "Simon J. Gerraty" Cc: Tomasz CEDRO , "freebsd-security@freebsd.org" , "freebsd-current@freebsd.org" , grarpamp , freebsd-virtualization@freebsd.org X-Rspamd-Queue-Id: 46sSyZ2xxlz3Gxf X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=KUdFAfDW; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of claydanielsjr@gmail.com designates 2607:f8b0:4864:20::943 as permitted sender) smtp.mailfrom=claydanielsjr@gmail.com X-Spamd-Result: default: False [-1.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; URI_COUNT_ODD(1.00)[3]; RCPT_COUNT_FIVE(0.00)[6]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; SUBJECT_ENDS_QUESTION(1.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; IP_SCORE(0.00)[ip: (2.61), ipnet: 2607:f8b0::/32(-2.50), asn: 15169(-2.11), country: US(-0.05)]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[3.4.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Oct 2019 19:18:31 -0000 Simon, please do elaborate more on your implementation. I suspect you are talking about libsecureboot? I have played with the generation of certs with OpenSSL & LibreSSL, but libsecureboot seems to take a different approach. Please tell us more. Clay On Mon, Oct 14, 2019 at 1:52 PM Simon J. Gerraty via freebsd-security < freebsd-security@freebsd.org> wrote: > Tomasz CEDRO wrote: > > > would be really nice also to get UEFI BOOT compatible with SECURE BOOT > :-) > > Unless you are using your own BIOS, the above means getting Microsoft > to sign boot1.efi or similar. Shims that simply work around lack of > acceptible signature don't help. > > That would need to then verify loader.efi - which can be built to > to verify all the modules and kernel. > > In my implementation (uses the non efi loader) trust anchors are > embedded in loader but there is code in current to lookup trust anchors > in /efi I think which would be more generally useful - I've not looked > at the attack vectors that introduces though. > > --sjg > _______________________________________________ > freebsd-security@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org > " >