On Wed, May 07 2014, Henrique de Moraes Holschuh wrote:

> Hello Manoj!
>
> On Mon, 05 May 2014, Manoj Srivastava wrote:
>>         True.  But it does add a link to the dbg paths that ill be
>>  populated if you install that. Incodentally, this is what the upsteam
>>  make deb-pkg does

> Well, the upstream Makefile somehow manages to sign the modules after all
> changes to the module file, thus the signatures are valid :-)

        Point.

> One possible fix would be to run the signature pass after updating the debug
> paths (and preferably also supressing any signature passes before the
> update, as the signature pass is quite slow and resource intensive).

        I'll look into this; currently I do not know how to invoke the
 signature pass.

>>         It is a 5trade off. Being able to debug vs signed modules. I
>>  suspect the trade off goes differently for vendor kernel packages and
>>  home brewed ones. Even without the objcopy, would the signed modules
>>  have the same signatures as the self compiled version? Is this a
>>  hypothetical, or do we have a concrete degradation in security?

> Obviously, if you cannot secure the bootloader, module signing won't
> get you much.  However, it is still useful to be able to have an extra
> security layer (as in "additionaly to apparmor/se-linux/etc") that
> gets in the way of a simple local root exploit giving you kernel
> powers (via modprobe/insmod).

        OK. I'll see what I can do.

> I am not really interested into the "vendor kernel" angle, as kernel-package
> is not used for that anymore.

        Yes, I know we both know that :-). I was unsiccesfully trying to
 ask whether signatures were important for a one off image package, but
 you have answered that above.

        manoj
-- 
It is your destiny. Darth Vader
Manoj Srivastava <sriva...@acm.org> <http://www.golden-gryphon.com/>  
4096R/C5779A1C E37E 5EC5 2A01 DA25 AD20  05B6 CF48 9438 C577 9A1C

Attachment: signature.asc
Description: PGP signature

Reply via email to