From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1SfmWg-0007wM-1g for garchives@archives.gentoo.org; Sat, 16 Jun 2012 06:30:26 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 1917FE07F9; Sat, 16 Jun 2012 06:30:11 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 53328E0743 for ; Sat, 16 Jun 2012 06:29:19 +0000 (UTC) Received: from pomiocik.lan (p14.ppp.polbox.pl [213.241.7.14]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: mgorny) by smtp.gentoo.org (Postfix) with ESMTPSA id 9241C1B4018; Sat, 16 Jun 2012 06:29:17 +0000 (UTC) Date: Sat, 16 Jun 2012 08:30:39 +0200 From: =?UTF-8?B?TWljaGHFgiBHw7Nybnk=?= To: gentoo-dev@lists.gentoo.org Cc: gregkh@gentoo.org Subject: Re: [gentoo-dev] UEFI secure boot and Gentoo Message-ID: <20120616083039.431fd772@pomiocik.lan> In-Reply-To: <20120615235652.GC9885@kroah.com> References: <20120615042810.GA9480@kroah.com> <4FDAC0A2.4070801@gentoo.org> <20120615235652.GC9885@kroah.com> Organization: Gentoo X-Mailer: Claws Mail 3.8.0 (GTK+ 2.24.10; x86_64-pc-linux-gnu) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@lists.gentoo.org Reply-to: gentoo-dev@lists.gentoo.org Mime-Version: 1.0 Content-Type: multipart/signed; micalg=PGP-SHA256; boundary="Sig_/lMOWJ3wZAAiisfWcC=nuCmm"; protocol="application/pgp-signature" X-Archives-Salt: 3cfc2b2f-fc0d-46de-a6d4-c33b7727c612 X-Archives-Hash: be6c966056d02bab6e65652e38700d1c --Sig_/lMOWJ3wZAAiisfWcC=nuCmm Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On Fri, 15 Jun 2012 16:56:52 -0700 Greg KH wrote: > On Fri, Jun 15, 2012 at 06:57:06AM +0200, Ch=C3=AD-Thanh Christopher > Nguy=E1=BB=85n wrote: > > If you have influence on UEFI secure boot spec, you could suggest > > that they mandate a UI which lists all boot images known to the EFI > > boot manager, and the user can easily whitelist both individual > > loaders and the keys used to sign them. >=20 > That has already been attempted, and it failed, so it will not happen, > sorry. We can still have some hope that EU is going to bounce this for a while like they did with Internet Explorer. --=20 Best regards, Micha=C5=82 G=C3=B3rny --Sig_/lMOWJ3wZAAiisfWcC=nuCmm Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) iJwEAQEIAAYFAk/cKBMACgkQfXuS5UK5QB2KvwP6Ap5HV9UEILvUDO+ejkhgLtzC kOccgmnObVoWujgdXTlFHO6RAgumgFqPifxQbct6sel/LC70ehQuY60aOvEh7wnW y/4UFgwKM4LI1B/vM6SWnqLsSgrCWy/Hr6R9Ko/bL8kWRmawttmBJsy6i+cjpfpe Y0F7xu5B4dLchHf0oec= =15qZ -----END PGP SIGNATURE----- --Sig_/lMOWJ3wZAAiisfWcC=nuCmm--