[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1557749313.10635.309.camel@linux.ibm.com>
Date: Mon, 13 May 2019 08:08:33 -0400
From: Mimi Zohar <zohar@...ux.ibm.com>
To: Rob Landley <rob@...dley.net>,
Roberto Sassu <roberto.sassu@...wei.com>,
Arvind Sankar <niveditas98@...il.com>
Cc: linux-kernel@...r.kernel.org, linux-api@...r.kernel.org,
linux-fsdevel@...r.kernel.org, linux-integrity@...r.kernel.org,
initramfs@...r.kernel.org
Subject: Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial
ram disk
On Mon, 2019-05-13 at 04:07 -0500, Rob Landley wrote:
> > Allowing a kernel with integrity enforcement to parse the CPIO image
> > without verifying it first is the weak point.
>
> If you don't verify the CPIO image then in theory it could have anything in it,
> yes. You seem to believe that signing individual files is more secure than
> signing the archive. This is certainly a point of view.
Nobody is claiming that signing and verifying individual files is more
secure. We are saying that in some environments BOTH are needed. In
many environments today the initramfs IS being signed and verified.
Unfortunately not all environments can sign the initramfs today,
because the initramfs is not distributed with the kernel image, but
generated on the target system.
Mimi
Powered by blists - more mailing lists