Richard Lowe wrote:
Jürgen Keil wrote:
Seems I found something; I wrote
Problem is that after the bfu, elfsign fails verification
for the kernel module /kernel/crypto/arcfour. This
breaks WEP support for the wlan driver "ipw", and it seems
as a result of this, my machine was unable to boot into multiuser
mode (the kernel complains about /kernel/crypto/arcfour
module verification errors).
I'm seeing errors like this:
# elfsign verify -v /kernel/crypto/arcfour
elfsign: verification of /kernel/crypto/arcfour failed.
format: rsa_md5_sha1.
signer: O=Sun Microsystems Inc, OU=Solaris Cryptographic Framework,
CN=SunOS 5.10.
..
Question is: how do we bfu upgrade to newer onnv
bits? Is the certificate file /etc/crypto/certs/SUNWObjectCA
invalid?
The problem is that the opensolaris mercurial repository
doesn't have the SCCS keywords expanded any more:
http://src.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/cmd/cmd-crypto/etc/certs/SUNWObjectCA
Note the ident "%Z%%M% %I% %E% SMI" line in this
file. Problem is that /usr/lib/libelfsign.so.1 has the
MD5 checksum of both /etc/crypto/certs/CA and
/etc/crypto/certs/SUNWObjectCA compiled into the libelfsign.so shared
library and the code refuses to
use these certs if their MD5 checksum doesn't match
the compiled-in values:
% strings - /usr/lib/libelfsign.so.1 | /usr/xpg4/bin/grep -E
'^[0-9a-f]{32}$'
4ede9ecb4868c0d2683b602f71596085 <<--- MD5: "SUNWObjectCA"
2646d63d62617aeae629d85cbd5daefc <<--- MD5: "CA"
% gmd5sum /etc/crypto/certs/CA /etc/crypto/certs/SUNWObjectCA
2646d63d62617aeae629d85cbd5daefc /etc/crypto/certs/CA
a8e0f35c570d3b379424f99f8ef5d409 /etc/crypto/certs/SUNWObjectCA
Ok, if this is the cause this is going to be problematic.
The obvious fix would be for the closed bins to be built with usr/src
get -k'd, but I suspect that would break something else instead
The other obvious fix would be to hotwire the bridge to not get -k the
affected certs, that's bogus.
The former is ugly, the latter is ugly *and* bogus (as you noted).
This always had the chance for explosive failure (since various crypto
bits were/are pulled from the last build, as they had to be RE signed),
but we'd been getting somewhat lucky (I, apparently, still am, this
isn't biting me).
I've Cc'd both people who should be familiar with the closed-bins build,
perhaps they see a way to make this not explode?
I would prefer to just take the keywords out of the certificates (and
thus the MD5 sum); it's something we're going to have to do for the SCM
Migration anyway, so let's just do it now.
cheers,
steve
--
stephen lau // [EMAIL PROTECTED] | 650.786.0845 | http://whacked.net
opensolaris // solaris kernel development
_______________________________________________
tools-discuss mailing list
tools-discuss@opensolaris.org