Project Description

Currently kernel module signature be attached in the end of kernel module (ko file). Scott Bahling has raised that there have some benefits that kernel allows to load module with a separate signature file.

Current module signature is PKCS#7 format, I thought that it's not hard to do that. But we will need a new system call for this.

Goal for this Hackweek

Implement a proof of concept in hackweek 20.

Resources

Base on the latest kernel mainline.

Looking for hackers with the skills:

kernel

This project is part of:

Hack Week 20

Activity

  • about 3 years ago: pperego liked this project.
  • about 3 years ago: mkubecek liked this project.
  • about 3 years ago: fanyadan liked this project.
  • about 3 years ago: joeyli added keyword "kernel" to this project.
  • about 3 years ago: joeyli originated this project.

  • Comments

    • joeyli
      about 3 years ago by joeyli | Reply

      Result: HEAD:users/jlee/stable/modsign-separate on kerncvs.suse.de

      TODO: - Support multi .ko.p7s file. - Search fingerprint in trusted keyring, platform keyring - Modify sign-file ? - Combine with current modverifysig() - coexist with embedded signature

    Similar Projects

    Authenticated hashes for BTRFS by dsterba

    Project Description

    Implement a checksum ...


    Model checking the BPF verifier by shunghsiyu

    Project Description

    BPF verifier plays a ...


    early stage kdump support by mbrugger

    [comment]: # (Please use the project descriptio...