-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
allow only loading signed kernel modules / module.sig_enforce=1 #156
Comments
quote @monsieuremre
This isn't possible for out-of-tree modules shipped by Kicksecure. (currently LKRG, tirdad)
Debian's key is there by Debian default. So all modules from Debian work by default.
The signing actually is already automated thanks to DKMS as per Debian default. The reason why these fail to load with kernel parameter [1]:
Right. Hence created this separate issue.
Same issue as above [1]. |
I cannot find the argument online anymore however So I don't see how it would stop any malware unless it is not sophisticated enough to do the signing. This might be only useful in a context of untrusted root. |
Yes. Locally signing the modules or the kernel itself brings nothing. Enabling secure boot is good, if Debian or RedHat or Canonical (or Kicksecure?) or some authority does the signing and not you yourself. Because a compromised OS can just sign stuff with the private key. If and only if there was a system-wide forcefully enforcing Mandatory Access Control Policy (foreshadowing) that is guarding the private keys, that is literally impossible to disable without recompiling or booting a live disk, then maybe in that case this might make sense. |
I agree that implementing this is not currently worth the time unless we can have some sort of external signing authority. I also think it would be quite useful when it comes to developing a untrusted root ( |
related:
https://forums.whonix.org/t/enforce-kernel-module-software-signature-verification-module-signing-disallow-kernel-module-loading-by-default/7880/63
Perhaps a separate issue.
(Not suggested as a replacement. Enforcing signature verification would be in addition.)
Originally posted by @adrelanos in #148 (comment)
The text was updated successfully, but these errors were encountered: