Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8773245imu; Tue, 4 Dec 2018 14:01:30 -0800 (PST) X-Google-Smtp-Source: AFSGD/XgQZqGeFnauGMHVHZifxhhx81NuM07I0c5W/aQh5Q5uoPsCEstQN13otBn3RSU3I1xmhDQ X-Received: by 2002:a17:902:29a7:: with SMTP id h36mr21941504plb.244.1543960890606; Tue, 04 Dec 2018 14:01:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543960890; cv=none; d=google.com; s=arc-20160816; b=Spl04Kcfvw2exkbZPHezR6pElVzs1f63HMwzvJrWRxKGG7Jzl6bwsyDx6yTC/foW+i Iz96zTEYD0jUoln0NNYBPlZN5b5Fskn/U8PfNzW8Q4fSYL+yDei7RsTDpKyvOeijX7rc ni1rwZCFqiveVJyQmstD7D3HdEmwUdUXso2lNf8NjhufJ2XJb8YpkmrgEynD6ktoIB4J B9CHYUp9SN+z5st/tXao2sDQwcslkdhY+Ciz+XcOhOixO+tw9/Z2gtZa3otxglzOOZ/I hWRY/aQRuBqnOhLm6PgItXVUveQNDBUgg+Mr/iz0sYuR1gcdjd304dbFm1bBotLemwJa cz+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=1F2Vvp4a4lA/EqQQuqcaYKPBpiug1KjLEL07Q1dmJe0=; b=ZOAMXxJFTReN4IVVeuTs7r3+dNIQ68ZoZPA8QL7PcZ5LJ9Cba5Q4gLZaUgUDYFDM9L xh7goD/0R89CiV+K3xJpaSllECvVuqq74D8PFy1I6lNxna8VJC/NnqgVFZ1rmxaQntXi IT6y7X8DobtcTeqkf9vFW/KJH3XyxyYla7rF4HyIXf922zbBIhDnnfGcq6EPTEUGzBdL e5Z7nAqKm7c5+FGndkfceOdASc2SVmXZ3HKZA075YkKmgWnhxY19Mqq/CxqjrcShAttx GU6iM98q6A2Vq6+UtIen9+VzZNmtigrUFux6NMV52iMcdAFrdfOEM3Sz0/D9hCt/rGxF ZVbw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x3si16828360pgf.453.2018.12.04.14.01.14; Tue, 04 Dec 2018 14:01:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726048AbeLDWAi (ORCPT + 99 others); Tue, 4 Dec 2018 17:00:38 -0500 Received: from namei.org ([65.99.196.166]:57642 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725880AbeLDWAh (ORCPT ); Tue, 4 Dec 2018 17:00:37 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id wB4Lxkjh022787; Tue, 4 Dec 2018 21:59:46 GMT Date: Wed, 5 Dec 2018 08:59:45 +1100 (AEDT) From: James Morris To: Thiago Jung Bauermann cc: linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Mimi Zohar , Dmitry Kasatkin , "Serge E. Hallyn" , David Howells , David Woodhouse , Jessica Yu , Herbert Xu , "David S. Miller" , Jonathan Corbet , "AKASHI, Takahiro" Subject: Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal In-Reply-To: <20181116200712.14154-1-bauerman@linux.ibm.com> Message-ID: References: <20181116200712.14154-1-bauerman@linux.ibm.com> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 16 Nov 2018, Thiago Jung Bauermann wrote: > On the OpenPOWER platform, secure boot and trusted boot are being > implemented using IMA for taking measurements and verifying signatures. > Since the kernel image on Power servers is an ELF binary, kernels are > signed using the scripts/sign-file tool and thus use the same signature > format as signed kernel modules. > > This patch series adds support in IMA for verifying those signatures. Are you saying you use IMA to verify kernels during boot? From a Linux bootloader? > It adds flexibility to OpenPOWER secure boot, because it allows it to boot > kernels with the signature appended to them as well as kernels where the > signature is stored in the IMA extended attribute. Just to clarify, with these patches, IMA will be able to verify the native form of signed kernel modules? i.e. without xattrs at all, and this will work with existing signed modules? -- James Morris