[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20121026023916.GA16762@srcf.ucam.org>
Date: Fri, 26 Oct 2012 03:39:16 +0100
From: Matthew Garrett <mjg@...hat.com>
To: Mimi Zohar <zohar@...ux.vnet.ibm.com>
Cc: Vivek Goyal <vgoyal@...hat.com>,
"Eric W. Biederman" <ebiederm@...ssion.com>,
Khalid Aziz <khalid@...ehiking.org>, kexec@...ts.infradead.org,
horms@...ge.net.au, Dave Young <dyoung@...hat.com>,
"H. Peter Anvin" <hpa@...or.com>,
linux kernel mailing list <linux-kernel@...r.kernel.org>,
Dmitry Kasatkin <dmitry.kasatkin@...el.com>,
Roberto Sassu <roberto.sassu@...ito.it>,
Kees Cook <keescook@...omium.org>
Subject: Re: Kdump with signed images
On Thu, Oct 25, 2012 at 09:15:58PM -0400, Mimi Zohar wrote:
> On a running system, the package installer, after verifying the package
> integrity, would install each file with the associated 'security.ima'
> extended attribute. The 'security.evm' digital signature would be
> installed with an HMAC, calculated using a system unique key.
The idea isn't to prevent /sbin/kexec from being modified after
installation - it's to prevent it from being possible to install a
system that has a modified /sbin/kexec. Leaving any part of this up to
the package installer means that it doesn't solve the problem we're
trying to solve here. It must be impossible for the kernel to launch any
/sbin/kexec that hasn't been signed by a trusted key that's been built
into the kernel, and it must be impossible for anything other than
/sbin/kexec to make the kexec system call.
--
Matthew Garrett | mjg59@...f.ucam.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists