James Bottomley <james.bottom...@hansenpartnership.com> writes: > On Mon, 2025-06-02 at 15:25 +0200, Vitaly Kuznetsov wrote: >> This patch complements commit 278311e417be ("kexec, KEYS: Make use of >> platform keyring for signature verify") and commit 6fce1f40e951 >> ("dm verity: add support for signature verification with platform >> keyring") >> and allows for signing modules using keys from SecureBoot 'db'. This >> may >> come handy when the user has control over it, e.g. in a virtualized >> or a >> cloud environment. >> >> Suggested-by: Robert Holmes <robehol...@gmail.com> >> Signed-off-by: Vitaly Kuznetsov <vkuzn...@redhat.com> >> --- >> Documentation/admin-guide/module-signing.rst | 6 ++++++ >> kernel/module/Kconfig | 11 +++++++++++ >> kernel/module/signing.c | 9 ++++++++- >> security/integrity/Kconfig | 2 +- >> 4 files changed, 26 insertions(+), 2 deletions(-) >> >> diff --git a/Documentation/admin-guide/module-signing.rst >> b/Documentation/admin-guide/module-signing.rst >> index a8667a777490..44ed93e586b9 100644 >> --- a/Documentation/admin-guide/module-signing.rst >> +++ b/Documentation/admin-guide/module-signing.rst >> @@ -118,6 +118,12 @@ This has a number of options available: >> additional certificates which will be included in the system >> keyring by >> default. >> >> + (5) :menuselection:`Use .platform keyring for verifying kernel >> modules signatures` >> + (``CONFIG_MODULE_SIG_PLATFORM``) >> + >> + This option additionally allows modules to be signed with a key >> present >> + in ``.platform`` keyring, e.g. a SecureBoot 'db' key. >> + >> Note that enabling module signing adds a dependency on the OpenSSL >> devel >> packages to the kernel build processes for the tool that does the >> signing. >> >> diff --git a/kernel/module/Kconfig b/kernel/module/Kconfig >> index 39278737bb68..f1b85c14548a 100644 >> --- a/kernel/module/Kconfig >> +++ b/kernel/module/Kconfig >> @@ -340,6 +340,17 @@ config MODULE_SIG_HASH >> default "sha3-384" if MODULE_SIG_SHA3_384 >> default "sha3-512" if MODULE_SIG_SHA3_512 >> >> +config MODULE_SIG_PLATFORM >> + bool "Use .platform keyring for verifying kernel modules >> signatures" >> + depends on INTEGRITY_PLATFORM_KEYRING >> + depends on MODULE_SIG >> + help >> + When selected, keys from .platform keyring can be used for >> verifying >> + modules signatures. In particular, this allows to use UEFI >> SecureBoot >> + 'db' for verification. >> + >> + If unsure, say N. >> + >> config MODULE_COMPRESS >> bool "Module compression" >> help >> diff --git a/kernel/module/signing.c b/kernel/module/signing.c >> index a2ff4242e623..3327e7243211 100644 >> --- a/kernel/module/signing.c >> +++ b/kernel/module/signing.c >> @@ -61,10 +61,17 @@ int mod_verify_sig(const void *mod, struct >> load_info *info) >> modlen -= sig_len + sizeof(ms); >> info->len = modlen; >> >> - return verify_pkcs7_signature(mod, modlen, mod + modlen, >> sig_len, >> + ret = verify_pkcs7_signature(mod, modlen, mod + modlen, >> sig_len, >> VERIFY_USE_SECONDARY_KEYRING, >> VERIFYING_MODULE_SIGNATURE, >> NULL, NULL); >> + if (ret == -ENOKEY && >> IS_ENABLED(CONFIG_MODULE_SIG_PLATFORM)) { >> + ret = verify_pkcs7_signature(mod, modlen, mod + >> modlen, sig_len, >> + VERIFY_USE_PLATFORM_KEYRING, >> + VERIFYING_MODULE_SIGNATURE, >> + NULL, NULL); >> + } >> + return ret; >> } > > I don't think this is the correct way to do it. If, as you say, db is > controlled by the end user and therefore has trusted contents, then I > think you want to update certs/system_keyring.c to link the platform > keyring into the secondary trusted one (like it does today for the > machine keyring), so it can be used by *every* application that checks > keyrings rather than just modules.
Yea, that would be the solution I allude to at the end of my cover letter: make .platform globally trusted so we don't need the 'trusted for kexec', 'trusted for dm-verity' zoo we already have. > > Also, are you sure a config option is the right thing? Presumably Red > Hat wants to limit its number of kernels and the design of just linking > the machine keyring (i.e. MoK) was for the use case where trust is > being pivoted away from db by shim, so users don't want to trust the db > keys they don't control. If the same kernel gets used for both > situations (trusted and untrusted db) you might want a runtime means to > distinguish them. I was not personally involved when RH put the patch downstream (and wasn't very successful in getting the background story) but it doesn't even have an additional Kconfig, e.g.: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-10/-/commit/03d4694fa6511132989bac0da11fa677ea5d29f6 so apparently there's no desire to limit anything, basically, .platform is always trusted on Fedora/RHEL systems (for a long time already). As part of the RFC, I'd like to try to understand under which conditions people may not want to trust 'db'. In the most common use case, 'db' is used to authorize shim and the kernel is signed by a cert from shim's vendor_db, not trusting 'db' for modules after that seems somawhat silly. Maybe we can detect the fact that the user took control over the system with MOK and untrust .platform only then (while trusting it by default)? A runtime toggle is not something I thought much about: the sole purpose of this part of 'lockdown' (limitimg unsigned modules load) seems to be to prevent someone who already has 'root' on the system to gain kernel level access to e.g. hide its activities. In case root can decide which keys are trusted, isn't it all in vain? Or maybe if the toggle is to just trust/not trust .platform (and not e.g. disable signatures verification completely, inject a new key,...) this is acceptable? Another option is to have a kernel command line parameter but this is complicated for users. -- Vitaly