Replies: 2 comments
-
LWN Module Signing articles has several articles that talk about signing kernel modules that could be relevant. |
Beta Was this translation helpful? Give feedback.
-
I think a signed message digest is not enough. I think it makes more sense to have the signing authority produce a bundle of claims that would include the message digest as well as metadata about the signer such as what verification was performed and by what version of the verifier. This would permit the relying party to better reason about whether or not to trust the accompanying eBPF byte code. Proposal: Possible claims might be:
The execution context can then examine the claims and verify that the environment in which the program will run matches the provided claims. |
Beta Was this translation helpful? Give feedback.
-
The overall approach to signing should be the same on Linux as it is for Windows so that the tooling to do signing works in the same manner. For example if you have two object files, one for Windows and one for Linux you should be able to use the same command and tooling. Here is an article describing this approach:
https://lwn.net/Articles/532778/
Beta Was this translation helpful? Give feedback.
All reactions