[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150521235430.24546.qmail@ns.horizon.com>
Date: 21 May 2015 19:54:30 -0400
From: "George Spelvin" <linux@...izon.com>
To: luto@...capital.net
Cc: dhowells@...hat.com, dwmw2@...radead.org, linux@...izon.com,
linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org, petkan@...-labs.com,
torvalds@...ux-foundation.org, tytso@....edu,
zohar@...ux.vnet.ibm.com
Subject: Re: Should we automatically generate a module signing key at all?
> Suppose you have a depth-k tree (i.e. up to 2^k modules). We'll
> compute a 32-byte value Tree(d, i) for each d from 0 to k and each i
> from 0 to 2^d-1. First you assign each module an index starting at
> zero (with the maximum index less than 2^k). Then you hash each
> module.
>
> To generate the leaves (i.e. nodes at depth k), you compute, for each
> i, Tree(k, i) = H(k, i, H(module payload)). For leaves that don't
> correspond to modules, you use some placeholder.
>
> For the ith node at lower depth, compute Tree(d, i) = H(k-1, i,
> Tree(d+1, 2*i), Tree(d+1, 2*i+1)).
>
> The proof associated with module i is Tree(k, i^1), Tree(k-1,
> (i>>1)^1), Tree(k-2, (i>>2)^1), etc, up through depth 1. Tree(0, 0)
> is built into the kernel.
Nice system. For an easier-to-visualize description (omitting some of
the details Andy includes here to avoid security problems), think of a
depth-k binary tree with 2^k modules (padded with zero-length dummies)
at the leaves. Each internal node is a hash of its two child hashes,
and the root hash is baked into the kernel.
To prove a module is a member of the hash tree, you need to walk the
path to the root, combining the two child hashes at each step.
So each module includes the k sibling hashes needed to trace a path to
the root. You hash the module, then combine it with its stored depth-k
sibling hash to compute the depth-k-1 hash. Then combine that with the
stored depth-k-1 sibling hash, and so on.
If any of the hashes are wrong (most importantly, the module hash itself),
the root hash won't match and the kernel will refuse to load the module.
It takes n log n space for n modules, which is completely reasonable.
The annoying thing is that it's a two-pass process: the kernel has to
have the hashes of ALL of the modules to generate the sibling hashes
for ANY of them.
Or, and this is the biggest change to the kernel build process, the kernel
image itself. No longer can you build the kernel image before building
modules.
To address other use cases, it's possible to allow multiple authentication
systems. You can generate one big tree for in-tree modules, then either
additional trees or the existing public-key signatures for additions.
Andy, an easier indexing scheme might use, instead the depth
and index separately, the implicit heap numbering. The root is
node 1, its children are 2 and 3, their children are 4 through 7, etc.
The modules are numbered 2^k through 2^(k+1)-1.
It's the same information, but slightly easier to keep track of.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists