Re: [GIT PULL] MODSIGN: Use PKCS#7 for module signatures

From: Andy Lutomirski
Date: Mon Jul 27 2015 - 16:46:14 EST


On 07/27/2015 12:33 PM, David Howells wrote:
Hi James,

Can you pull this into security/next please? Its aim is twofold: firstly,
make the module signatures of PKCS#7/CMS format rather than a home-brewed
format and secondly to pave the way for use of the signing code for
firmware signatures (to follow later).

With all this stuff applied, will the kernel accept PKCS#7 signatures that *don't* have authenticated attributes or that are otherwise cryptographically insecure in that they fail to provide the property that an attacker can't manipulate a valid signature on one message to look like a valid signature on a different message?

It looks like fixing that might actually be important if anyone ever wants to use this for firmware signing.

At least there's no issue with newer kernels needing to accept module signautures generated by old tools, since the newer kernels won't accept the underlying modules anyway.

--Andy
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/