Re: F36 Change: DIGLIM (System-Wide Change proposal)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Could this feature work with 3rd party kernel modules, in a UEFI
Secure Boot (and thus kernel lockdown) context?

Workstation working group is tracking this problem as
https://pagure.io/fedora-workstation/issue/155

If DIGLIM could be used for this use case, I further wonder whether
it's possible to have multiple signatures for different portions of a
kernel module? The purpose, is so NVIDIA can sign their proprietary
binary blob (because it's theirs, no one else's, and therefore they
should sign it). Next,either (a) Fedora (b) RPM Fusion (c) the user,
can sign the remainder of the kernel module (the parts that are open
source anyway). It's an open question who could or should sign
NVIDIA's key, to narrowly indicate trust. And also a mechanism for
revoking that trust without breaking everything else.

--
Chris Murphy
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux