From: Laszlo Ersek <lersek@redhat.com>
To: "Palmer, Thomas" <thomas.palmer@hpe.com>,
edk2-devel-01 <edk2-devel@lists.01.org>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>, Eric Dong <eric.dong@intel.com>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
Jordan Justen <jordan.l.justen@intel.com>,
"Lin, Gary" <GLin@suse.com>,
Anthony Perard <anthony.perard@citrix.com>,
Star Zeng <star.zeng@intel.com>
Subject: Re: [PATCH 0/4] MdeModulePkg, OvmfPkg: support large CA cert list for HTTPS boot
Date: Thu, 29 Mar 2018 13:57:20 +0200 [thread overview]
Message-ID: <e84c41b2-637f-68d6-ba26-b614f5a4b99c@redhat.com> (raw)
In-Reply-To: <TU4PR8401MB10865C140714C6073706CBC4EDA20@TU4PR8401MB1086.NAMPRD84.PROD.OUTLOOK.COM>
On 03/29/18 06:56, Palmer, Thomas wrote:
> Laszlo,
>
> (First, are you are plugfest? Let's chat.)
I like chatting :) but I'm not at the plugfest. I travel only once per
year, and that's to the KVM Forum.
> Second, what need do you see for having KB worth of CA at UEFI's
> disposal? If HTTPS feature is primarily for PXE booting OS's,
> then it is likely the IT administrator who setup the PXE server
> also has a single CA they want use for PXE. By allowing any
> and every CA to be installed (instead of having the user pick
> only the immediately needed CAs), we inadvertently open HTTPS to
> state-backed/well-financed malicious actors who can pay for
> quality SSL signing services. (The less CAs then the less that
> can go wrong).
In a virt setup, we have to split this question in two.
(1) Why do we want to configure the guest from the host side?
(2) Why do we want to push down so many CA certs to the guest?
The answer to (1) is quite obvious: configuring the guest from the host
side allows for better automation, larger scale deployment, integration
with management tools etc.
Regarding (2), the premise is that the virtualization host administrator
has a carefully curated set of trusted CA certificates. It does not
necessarily need to be the full CA bundle from Mozilla, it just may be.
The feature that folks from our crypto and virt management tools teams
are requesting is that the HTTPS configuration in the guest, for OVMF
netbooting, not require *separate* administration from the host CA
curation.
(The same applies to the trusted cipher suites as well, and I'm going to
post patches for that too.)
> This is not to prevent your patches going in, but would like to
> ensure manufacturers / admins know how to properly use the CA
> list
Oh, definitely. The idea here is *absolutely not* to encourage platform
vendors (physical or virtual) to heap shady CAs into
EFI_TLS_CA_CERTIFICATE_VARIABLE. This work is all about mechanism, not
policy; I'm just building the conduit through wich the virt host admin
can send down the CA list that they have *carefully* vetted for
host-side use already. If that list contains just one certificate, so be
it.
In my testing, the 182KB number comes from the default CA bundle from
Mozilla (the "ca-certificates" package) on my RHEL-7 laptop, which -- as
you can likely tell :) -- I haven't personally filtered down.
Thanks
Laszlo
next prev parent reply other threads:[~2018-03-29 11:50 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-03-28 20:26 [PATCH 0/4] MdeModulePkg, OvmfPkg: support large CA cert list for HTTPS boot Laszlo Ersek
2018-03-28 20:26 ` [PATCH 1/4] MdeModulePkg/Variable/RuntimeDxe: introduce PcdMaxVolatileVariableSize Laszlo Ersek
2018-03-29 1:34 ` Zeng, Star
2018-03-29 12:19 ` Laszlo Ersek
2018-03-30 0:54 ` Zeng, Star
2018-03-28 20:26 ` [PATCH 2/4] OvmfPkg/EmuVariableFvbRuntimeDxe: stop using PcdVariableStoreSize Laszlo Ersek
2018-03-30 10:57 ` Ard Biesheuvel
2018-03-28 20:26 ` [PATCH 3/4] OvmfPkg: annotate "PcdVariableStoreSize := PcdFlashNvStorageVariableSize" Laszlo Ersek
2018-03-30 10:58 ` Ard Biesheuvel
2018-03-28 20:26 ` [PATCH 4/4] OvmfPkg/TlsAuthConfigLib: configure trusted CA certs for HTTPS boot Laszlo Ersek
2018-03-30 11:00 ` Ard Biesheuvel
2018-03-29 4:56 ` [PATCH 0/4] MdeModulePkg, OvmfPkg: support large CA cert list " Palmer, Thomas
2018-03-29 11:57 ` Laszlo Ersek [this message]
2018-03-29 18:17 ` Palmer, Thomas
2018-03-30 4:39 ` Gary Lin
2018-03-30 19:43 ` Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=e84c41b2-637f-68d6-ba26-b614f5a4b99c@redhat.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox