From: Andreas Gruenbacher Subject: Re: [PATCH 0/6] MODSIGN: Kernel module signing Date: Thu, 15 Feb 2007 14:12:43 -0800 Message-ID: <200702151412.43758.agruen@suse.de> References: <20070214190938.6438.15091.stgit@warthog.cambridge.redhat.com> <200702142214.53625.agruen@suse.de> <200702152034.l1FKYS93012172@turing-police.cc.vt.edu> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Cc: Dave Jones , Andrew Morton , David Howells , torvalds@linux-foundation.org, herbert.xu@redhat.com, linux-kernel@vger.kernel.org, arjan@infradead.org, linux-crypto@vger.kernel.org To: Valdis.Kletnieks@vt.edu Return-path: Received: from ns2.suse.de ([195.135.220.15]:39377 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161472AbXBOWNG (ORCPT ); Thu, 15 Feb 2007 17:13:06 -0500 In-Reply-To: <200702152034.l1FKYS93012172@turing-police.cc.vt.edu> Content-Disposition: inline Sender: linux-crypto-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org On Thursday 15 February 2007 12:34, Valdis.Kletnieks@vt.edu wrote: > On Wed, 14 Feb 2007 22:14:53 PST, Andreas Gruenbacher said: > > I agree, that's really what should happen. We solve this by marking > > modules as supported, partner supported, or unsupported, but in an > > "insecure" way, so partners and users could try to fake the support > > status of a module and/or remove status flags from Oopses, and > > cryptography wouldn't save us. > > Where cryptography *can* save you is that a partner or user can't fake a > 'Suse Supported' signature without access to the Suse private key. No question about that. We actually already get this from rpm signatures. What would module signatures buy us? The kernel could then reliably determine that an unsigned module was loaded. But people could still fake their Oopses, or overwite the flags which indicate that a module's signature didn't match, so we still wouldn't reliably get at that information. Andreas