[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <501216.1749826470@warthog.procyon.org.uk>
Date: Fri, 13 Jun 2025 15:54:30 +0100
From: David Howells <dhowells@...hat.com>
To: Herbert Xu <herbert@...dor.apana.org.au>,
Stephan Mueller <smueller@...onox.de>, Simo Sorce <simo@...hat.com>,
torvalds@...ux-foundation.org, Paul Moore <paul@...l-moore.com>
cc: dhowells@...hat.com, Lukas Wunner <lukas@...ner.de>,
Ignat Korchagin <ignat@...udflare.com>,
Clemens Lang <cllang@...hat.com>,
David Bohannon <dbohanno@...hat.com>,
Roberto Sassu <roberto.sassu@...wei.com>, keyrings@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Module signing and post-quantum crypto public key algorithms
Hi,
So we need to do something about the impending quantum-related obsolescence of
the RSA signatures that we use for module signing, kexec, BPF signing, IMA and
a bunch of other things.
>From my point of view, the simplest way would be to implement key verification
in the kernel for one (or more) of the available post-quantum algorithms (of
which there are at least three), driving this with appropriate changes to the
X.509 certificate to indicate that's what we want to use.
The good news is that Stephan Mueller has an implemementation that includes
kernel bits that we can use, or, at least, adapt:
https://github.com/smuellerDD/leancrypto/
Note that we only need the signature verification bits. One question, though:
he's done it as a standalone "leancrypto" module, not integrated into crypto/,
but should it be integrated into crypto/ or is the standalone fine?
The not so good news, as I understand it, though, is that the X.509 bits are
not yet standardised.
However! Not everyone agrees with this. An alternative proposal would rather
get the signature verification code out of the kernel entirely. Simo Sorce's
proposal, for example, AIUI, is to compile all the hashes we need into the
kernel at build time, possibly with a hashed hash list to be loaded later to
reduce the amount of uncompressible code in the kernel. If signatures are
needed at all, then this should be offloaded to a userspace program (which
would also have to be hashed and marked unptraceable and I think unswappable)
to do the checking.
I don't think we can dispense with signature checking entirely, though: we
need it for third party module loading, quick single-module driver updates and
all the non-module checking stuff. If it were to be done in userspace, this
might entail an upcall for each signature we want to check - either that, or
the kernel has to run a server process that it can delegate checking to.
It's also been suggested that PQ algorithms are really slow. For kernel
modules that might not matter too much as we may well not load more than 200
or so during boot - but there are other users that may get used more
frequently (IMA, for example).
Now, there's also a possible hybrid approach, if I understand Roberto Sassu's
proposal correctly, whereby it caches bundles of hashes obtained from, say,
the hashes included in an RPM. These bundles of hashes can be checked by
signature generated by the package signing process. This would reduce the PQ
overhead to checking a bundle and would also make IMA's measuring easier as
the hashes can be added in the right order, rather than being dependent on the
order that the binaries are used.
David
Powered by blists - more mailing lists