Project Description

Currently kernel module signature be attached in the end of kernel module (ko file). Scott Bahling has raised that there have some benefits that kernel allows to load module with a separate signature file.

Current module signature is PKCS#7 format, I thought that it's not hard to do that. But we will need a new system call for this.

Goal for this Hackweek

Implement a proof of concept in hackweek 20.

Resources

Base on the latest kernel mainline.

Looking for hackers with the skills:

kernel

This project is part of:

Hack Week 20

Activity

  • over 1 year ago: pperego liked this project.
  • over 1 year ago: mkubecek liked this project.
  • over 1 year ago: fanyadan liked this project.
  • over 1 year ago: joeyli added keyword "kernel" to this project.
  • over 1 year ago: joeyli originated this project.

  • Comments

    • joeyli
      over 1 year ago by joeyli | Reply

      Result: HEAD:users/jlee/stable/modsign-separate on kerncvs.suse.de

      TODO: - Support multi .ko.p7s file. - Search fingerprint in trusted keyring, platform keyring - Modify sign-file ? - Combine with current modverifysig() - coexist with embedded signature

    Similar Projects

    Modular kernel packaging by mwilck

    Project Description

    Create a PoC for a mo...


    Nanos Unikernel by rpalethorpe

    Project Description

    Nanos is a "unikernel...


    Poking technologies for enrolling customer key to kernel trusted keyring by joeyli

    [comment]: # (Please use the project descriptio...


    early stage kdump support by mbrugger

    [comment]: # (Please use the project descriptio...


    Rust in linux kernel by dsterba

    [comment]: # (Please use the project descriptio...