[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20121018213112.3903.qmail@science.horizon.com>
Date: 18 Oct 2012 17:31:12 -0400
From: "George Spelvin" <linux@...izon.com>
To: linux-kernel@...r.kernel.org
Cc: jwboyer@...hat.com, linux@...izon.com,
torvalds@...ux-foundation.org
Subject: Re: RFC: sign the modules at install time
The micturator of the Holy Penguin Pee spake:
> (Side note: I hope people realize that the random key is generated
> with a 100-year lifespan. So if you build a kernel today, you do
> potentially have a "year-2112 problem". I'm not horribly worried, but
> I *am* a bit worried about 32-bit time_t overflow and I hope 32-bit
> openssl doesn't do anything odd)
Well, the kernel uses time_t, which should be >= 64 bits on any machine
still operational outside the computer history museum at that time.
But it also allows an expiry time of 0 to indicate "no expiration".
It's worth noting that in X.509 *keys* don't have expirations; only
*certifications* do. That is, the signature binding a name to the key.
You can issue any number of certificates, with different expiration dates,
on the same key.
(The only reason that there's this "certificate = key" confusion
is that X.509 doesn't specify a format for a bare key, so the
certificate format is also used as a key container.)
I haven't figured out the kernel key loading procedure, but it's not
clear that it even sets the expiry time. It does not, for example,
have any equivalent to the X.509 validity start time, so it wasn't
designed with importing certificates in mind.
Even if it is set, you could disable expiration checking on key lookup
and not care about expiration dates. (Pass no_state_check=true as the
last argument to keyring_search_aux.)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists