kernelnewbies.kernelnewbies.org archive mirror
 help / color / mirror / Atom feed
From: "Valdis Klētnieks" <valdis.kletnieks@vt.edu>
To: Gidi Gal <gidi.gal.linux@gmail.com>
Cc: Aruna Hewapathirane <aruna.hewapathirane@gmail.com>,
	kernelnewbies@kernelnewbies.org
Subject: Re: "Invalid signature" issue on dev kernel launch
Date: Wed, 24 Mar 2021 11:17:57 -0400	[thread overview]
Message-ID: <109999.1616599077@turing-police> (raw)
In-Reply-To: <CAB+0VomZ52MLy9Ehxcjit=xs0OpWE0ne+g8y_qxYFZCPwLLsYg@mail.gmail.com>


[-- Attachment #1.1: Type: text/plain, Size: 961 bytes --]

On Wed, 24 Mar 2021 14:58:05 +0200, you said:

> What kind of changes in the kernel require testing with valid signatures ?

Pretty much only changes that affect module signing.

If your threat model doesn't include "hacker sticks rogue module on
your box and gets it loaded to install backdoor", you can turn off
module signing on your self-compiled kernels.  Distros don't do that,
because those kernels *do* get installed on high-value targets where
"hacker installs backdoor kernel module" is very much part of the threat model.

Conversely, you can get secure boot to work with self-compiled kernels, but you
have to create a local trusted signature, feed it to the bios/efi, then sign
grub2 with that signature, and then lather/rinse repeat, telling grub2 about a
certificate used to sign the kernel, and then enable kernel module signing.
Very much a  "some assembly required" procedure, and you have to remember to
re-sign grub2 whenever it's updated.


[-- Attachment #1.2: Type: application/pgp-signature, Size: 832 bytes --]

[-- Attachment #2: Type: text/plain, Size: 170 bytes --]

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

  parent reply	other threads:[~2021-03-24 15:18 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-03-23 16:36 "Invalid signature" issue on dev kernel launch Gidi Gal
2021-03-23 21:08 ` Valdis Klētnieks
2021-03-24  2:25   ` Aruna Hewapathirane
2021-03-24  2:20 ` Aruna Hewapathirane
2021-03-24  2:36 ` Aruna Hewapathirane
2021-03-24  5:26   ` Valdis Klētnieks
2021-03-24 13:21     ` Aruna Hewapathirane
2021-03-24 14:59       ` Valdis Klētnieks
2021-03-24 12:58   ` Gidi Gal
2021-03-24 13:26     ` Aruna Hewapathirane
2021-03-24 15:17     ` Valdis Klētnieks [this message]
2021-03-24 13:12   ` Gidi Gal

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=109999.1616599077@turing-police \
    --to=valdis.kletnieks@vt.edu \
    --cc=aruna.hewapathirane@gmail.com \
    --cc=gidi.gal.linux@gmail.com \
    --cc=kernelnewbies@kernelnewbies.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).