Project Description

Currently kernel module signature be attached in the end of kernel module (ko file). Scott Bahling has raised that there have some benefits that kernel allows to load module with a separate signature file.

Current module signature is PKCS#7 format, I thought that it's not hard to do that. But we will need a new system call for this.

Goal for this Hackweek

Implement a proof of concept in hackweek 20.

Resources

Base on the latest kernel mainline.

Looking for hackers with the skills:

kernel

This project is part of:

Hack Week 20

Activity

  • over 3 years ago: pperego liked this project.
  • over 3 years ago: mkubecek liked this project.
  • over 3 years ago: fanyadan liked this project.
  • over 3 years ago: joeyli added keyword "kernel" to this project.
  • over 3 years ago: joeyli originated this project.

  • Comments

    • joeyli
      over 3 years ago by joeyli | Reply

      Result: HEAD:users/jlee/stable/modsign-separate on kerncvs.suse.de

      TODO: - Support multi .ko.p7s file. - Search fingerprint in trusted keyring, platform keyring - Modify sign-file ? - Combine with current modverifysig() - coexist with embedded signature

    Similar Projects

    Modularization and Modernization of cifs.ko for Enhanced SMB Protocol Support by hcarvalho

    Creator:<br> Enzo Matsumiya ematsumiya@suse.de...


    Contributing to Linux Kernel security by pperego

    Description

    A couple of weeks ago, I foun...


    Linux on Cavium CN23XX cards by tsbogend

    Before Cavium switched to ARM64 CPUs they devel...


    Improve UML page fault handler by ptesarik

    Description

    Improve UML handling of segment...


    FizzBuzz OS by mssola

    Project Description

    FizzBuzz OS (or just ...