From mboxrd@z Thu Jan 1 00:00:00 1970 From: Mimi Zohar Subject: Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk Date: Thu, 16 May 2019 09:31:32 -0400 Message-ID: <1558013492.4581.97.camel@linux.ibm.com> References: <4f522e28-29c8-5930-5d90-e0086b503613@landley.net> <1557861511.3378.19.camel@HansenPartnership.com> <4da3dbda-bb76-5d71-d5c5-c03d98350ab0@landley.net> <1557878052.2873.6.camel@HansenPartnership.com> <20190515005221.GB88615@rani.riverdale.lan> <20190515160834.GA81614@rani.riverdale.lan> <20190516052934.GA68777@rani.riverdale.lan> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit Return-path: In-Reply-To: <20190516052934.GA68777@rani.riverdale.lan> Sender: linux-kernel-owner@vger.kernel.org To: Arvind Sankar , Roberto Sassu , Mehmet Kayaalp Cc: James Bottomley , Rob Landley , Andy Lutomirski , Arvind Sankar , LKML , Linux API , Linux FS Devel , linux-integrity , initramfs@vger.kernel.org, Silviu Vlasceanu List-Id: linux-api@vger.kernel.org On Thu, 2019-05-16 at 01:29 -0400, Arvind Sankar wrote: > I think that's a separate issue. If you want to allow people to be able > to put files onto the system that will be IMA verified, they need to > have some way to locally sign them whether it's inside an initramfs or > on a real root filesystem. Anyone building their own kernel can build their own key into the kernel image.  Another option is to build the kernel with   CONFIG_SYSTEM_EXTRA_CERTIFICATE enabled, allowing an additional certificate to be inserted into the kernel image post build.  The additional certificate will be loaded onto the builtin kernel keyring.  Certificates signed with the private key can then be added to the IMA keyring.  By modifying the kernel image, the kernel image obviously needs to be resigned.  Additional patches "Certificate insertion support for x86 bzImages" were posted, but have not been upstreamed. This patch set adds the security xattrs needed by IMA. Mimi