Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Mimi Zohar <zohar <at> linux.vnet.ibm.com>
Subject: [PATCH 0/5] ima: extending secure boot certifcate chain of trust
Newsgroups: gmane.linux.kernel.lsm
Date: Tuesday 20th August 2013 18:36:25 UTC (over 4 years ago)
IMA-appraisal enforces local file integrity based on either a hash
or digital signature stored as an extended attribute.  The public
keys are loaded on the '_ima' keyring, as early as possible, normally
during the initramfs.

This patch set extends the secure boot chain of trust to IMA-appraisal,
based on David Howells proposed 'trusted' keyring patches. The idea is
that the '_ima' keyring will require 'trusted' public keys, to extend
the chain of trust up into the filesystem.

Initially, only those keys signed by a built-in key (eg. module, or
local-ca) can be loaded on the '_ima' keyring.  Subsequently, instead
of requiring the kernel to be recompiled to embed the public 'local-ca'
key, future patches could load the UEFI MoKlist key on the system
trusted keyring.

Defining a 'local-ca' permits the computer/device owner to decide
which, if any, third party keys should be 'trusted' for IMA-appraisal.

This patch set adds support to verify that an x509 certificate
has been signed by a key on the system 'trusted' keyring, and creates
a new built-in 'trusted' keyring named '_ima'.

Mimi

Mimi Zohar (5):
  KEYS: make the system 'trusted' keyring viewable by userspace
  KEYS: verify a certificate is signed by a 'trusted' key
  KEYS: prevent replacing existing trusted keyring
  KEYS: initialize root uid and session keyrings early
  ima: define '_ima' as a builtin 'trusted' keyring

 crypto/asymmetric_keys/x509_public_key.c | 70
+++++++++++++++++++++++++++++++-
 include/uapi/linux/keyctl.h              |  1 +
 kernel/system_keyring.c                  |  6 +--
 security/integrity/digsig.c              | 24 ++++++++++-
 security/integrity/ima/Kconfig           |  8 ++++
 security/integrity/ima/ima_appraise.c    | 11 +++++
 security/integrity/integrity.h           |  2 +
 security/keys/Makefile                   |  1 +
 security/keys/key.c                      | 16 ++++++++
 security/keys/process_keys.c             |  4 ++
 security/keys/root_keyring.c             | 18 ++++++++
 11 files changed, 155 insertions(+), 6 deletions(-)
 create mode 100644 security/keys/root_keyring.c

-- 
1.8.1.4

--
To unsubscribe from this list: send the line "unsubscribe
linux-security-module" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
 
CD: 3ms