> My assumption here is: > 1) there are some less important and so security-insensitive firmwares, > by which I mean that such firmwares won't be expected to be signed in > terms of vulnerability or integrity. > (I can't give you examples though.) > 2) firmware's signature will be presented separately from the firmware > blob itself. Say, "firmware.bin.p7s" for "firmware.bin" For x86 at least any firmware on any system modern enough to support 'secure' boot should already be signed. The only major exception is likely to be for things like random USB widgets. Even things like input controller firmware loaded over i2c or spi is usually signed because you could do fun things with input faking otherwise. The other usual exception is FPGAs, but since the point of an FPGA is usually the fact it *can* be reprogrammed it's not clear that signing FPGA firmware makes sense unless it is designed to be fixed function. You can't subvert the bus protocols on the x86 FPGA I am aware of as those bits are signed (or hard IP), but without IOMMU I am not sure FPGA and 'secure' boot is completely compatible. Alan -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html