linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* IMA appraisal with TPMv2?
@ 2021-01-06 10:47 Chang, Clay (HPS OE-Linux TDC)
  2021-01-12 22:28 ` Ken Goldman
  0 siblings, 1 reply; 2+ messages in thread
From: Chang, Clay (HPS OE-Linux TDC) @ 2021-01-06 10:47 UTC (permalink / raw)
  To: linux-integrity

Hi,

As I know, IMA appraisal with digital signature uses the public key on the .ima 
keyring for verification, and the public key needs to be signed by a certificate 
embedded into the kernel (CONFIG_SYSTEM_EXTRA_CERTIFICATE). While this approach 
looks fine, it requires kernel re-gen and re-sign in the context of secure boot.

My question is that for IMA appraisal, is it possible to verify the signature 
with the TPMv2? My intention is leverage the TPMv2 device and to avoid the 
kernel re-gen/re-sign.

For signing, I know I need a tool that uses TPMv2 to sign the executable and 
write the signature to the xattr of the file.

Thanks,
Clay

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: IMA appraisal with TPMv2?
  2021-01-06 10:47 IMA appraisal with TPMv2? Chang, Clay (HPS OE-Linux TDC)
@ 2021-01-12 22:28 ` Ken Goldman
  0 siblings, 0 replies; 2+ messages in thread
From: Ken Goldman @ 2021-01-12 22:28 UTC (permalink / raw)
  To: Chang, Clay (HPS OE-Linux TDC), linux-integrity

On 1/6/2021 5:47 AM, Chang, Clay (HPS OE-Linux TDC) wrote:
> Hi,
> 
> As I know, IMA appraisal with digital signature uses the public key on the .ima
> keyring for verification, and the public key needs to be signed by a certificate
> embedded into the kernel (CONFIG_SYSTEM_EXTRA_CERTIFICATE). While this approach
> looks fine, it requires kernel re-gen and re-sign in the context of secure boot.
> 
> My question is that for IMA appraisal, is it possible to verify the signature
> with the TPMv2? My intention is leverage the TPMv2 device and to avoid the
> kernel re-gen/re-sign.
> 
> For signing, I know I need a tool that uses TPMv2 to sign the executable and
> write the signature to the xattr of the file.

I don't understand the re-sign piece, so this may not make sense.

The TPM can certainly do signature verification as long as you can load the
public key.  However

- It will be very slow compared to software.
- If you can load the public key, can't you do the verification in SW?

The two main use cases for TPM signature verification are:

- In environments where SW does not have crypto.
- When the TPM is producing a ticket for a subsequent TPM operation.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-01-12 22:30 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-01-06 10:47 IMA appraisal with TPMv2? Chang, Clay (HPS OE-Linux TDC)
2021-01-12 22:28 ` Ken Goldman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).