[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1492546666-16615-1-git-send-email-bauerman@linux.vnet.ibm.com>
Date: Tue, 18 Apr 2017 17:17:40 -0300
From: Thiago Jung Bauermann <bauerman@...ux.vnet.ibm.com>
To: linux-security-module@...r.kernel.org
Cc: linux-ima-devel@...ts.sourceforge.net, keyrings@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
Mimi Zohar <zohar@...ux.vnet.ibm.com>,
Dmitry Kasatkin <dmitry.kasatkin@...il.com>,
David Howells <dhowells@...hat.com>,
Herbert Xu <herbert@...dor.apana.org.au>,
"David S. Miller" <davem@...emloft.net>,
Claudio Carvalho <cclaudio@...ux.vnet.ibm.com>,
Thiago Jung Bauermann <bauerman@...ux.vnet.ibm.com>
Subject: [PATCH 0/6] Appended signatures support for IMA appraisal
On the OpenPOWER platform, secure boot and trusted boot are being
implemented using IMA for taking measurements and verifying signatures.
Since the kernel image on Power servers is an ELF binary, kernels are
signed using the scripts/sign-file tool and thus use the same signature
format as signed kernel modules.
This patch series adds support in IMA for verifying those signatures.
It adds flexibility to OpenPOWER secure boot, because it can boot kernels
with the signature appended to them as well as kernels where the signature
is stored in the IMA extended attribute.
The first four patches are cleanups and improvements that can be taken
independently from the others (and from each other as well). The last two
are the ones actually focused on this feature.
These patches apply on top of today's linux-security/next.
Thiago Jung Bauermann (6):
integrity: Small code improvements
ima: Tidy up constant strings
ima: Simplify policy_func_show.
ima: Log the same audit cause whenever a file has no signature
MODSIGN: Export module signature definitions.
ima: Support appended signatures for appraisal
crypto/asymmetric_keys/asymmetric_type.c | 1 +
crypto/asymmetric_keys/pkcs7_parser.c | 12 +++++
crypto/asymmetric_keys/pkcs7_verify.c | 13 +++++
include/crypto/pkcs7.h | 3 ++
include/linux/module_signature.h | 45 ++++++++++++++++
include/linux/verification.h | 1 +
init/Kconfig | 6 ++-
kernel/Makefile | 2 +-
kernel/module_signing.c | 74 +++++++++++----------------
security/integrity/Kconfig | 2 +-
security/integrity/digsig_asymmetric.c | 4 +-
security/integrity/iint.c | 2 +-
security/integrity/ima/Kconfig | 13 +++++
security/integrity/ima/ima.h | 8 +++
security/integrity/ima/ima_appraise.c | 86 ++++++++++++++++++++++++++++++-
security/integrity/ima/ima_init.c | 2 +-
security/integrity/ima/ima_main.c | 30 +++++++++--
security/integrity/ima/ima_policy.c | 88 ++++++++++++--------------------
security/integrity/integrity.h | 27 ++++++----
19 files changed, 302 insertions(+), 117 deletions(-)
create mode 100644 include/linux/module_signature.h
--
2.7.4
Powered by blists - more mailing lists