mirror of
https://git.yoctoproject.org/meta-security
synced 2026-01-11 15:00:34 +00:00
ima: Document and replace keys and adapt scripts for EC keys
For shorted file signatures use EC keys rather than RSA keys. Document the debug keys and their purpose. Adapt the scripts for creating these types of keys to now create EC keys. Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
committed by
Armin Kuster
parent
3b5fa74e77
commit
0652c9fd74
17
meta-integrity/data/debug-keys/README.md
Normal file
17
meta-integrity/data/debug-keys/README.md
Normal file
@@ -0,0 +1,17 @@
|
||||
# EVM & IMA keys
|
||||
|
||||
The following IMA & EVM debug/test keys are in this directory
|
||||
|
||||
- ima-local-ca.priv: The CA's private key (password: 1234)
|
||||
- ima-local-ca.pem: The CA's self-signed certificate
|
||||
- privkey_ima.pem: IMA & EVM private key used for signing files
|
||||
- x509_ima.der: Certificate containing public key (of privkey_ima.pem) to verify signatures
|
||||
|
||||
The CA's (self-signed) certificate can be used to verify the validity of
|
||||
the x509_ima.der certificate. Since the CA certificate will be built into
|
||||
the Linux kernel, any key (x509_ima.der) loaded onto the .ima keyring must
|
||||
pass this test:
|
||||
|
||||
```
|
||||
openssl verify -CAfile ima-local-ca.pem x509_ima.der
|
||||
````
|
||||
15
meta-integrity/data/debug-keys/ima-local-ca.pem
Normal file
15
meta-integrity/data/debug-keys/ima-local-ca.pem
Normal file
@@ -0,0 +1,15 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICWzCCAgCgAwIBAgITYMKT7/z5qI+hLfNC6Jy6hhBCWDAKBggqhkjOPQQDAjB9
|
||||
MRQwEgYDVQQKDAtleGFtcGxlLmNvbTFAMD4GA1UEAww3bWV0YS1pbnRlbC1pb3Qt
|
||||
c2VjdXJpdHkgZXhhbXBsZSBjZXJ0aWZpY2F0ZSBzaWduaW5nIGtleTEjMCEGCSqG
|
||||
SIb3DQEJARYUam9obi5kb2VAZXhhbXBsZS5jb20wIBcNMjMwNDI2MTYyNjExWhgP
|
||||
MjEyMzA0MDIxNjI2MTFaMH0xFDASBgNVBAoMC2V4YW1wbGUuY29tMUAwPgYDVQQD
|
||||
DDdtZXRhLWludGVsLWlvdC1zZWN1cml0eSBleGFtcGxlIGNlcnRpZmljYXRlIHNp
|
||||
Z25pbmcga2V5MSMwIQYJKoZIhvcNAQkBFhRqb2huLmRvZUBleGFtcGxlLmNvbTBZ
|
||||
MBMGByqGSM49AgEGCCqGSM49AwEHA0IABCiC+YIbCoOhyLy63lOGbiK+DPkW7gMU
|
||||
rmfVLIb4oTmKxZS5/L8VE6hjKDcLa7OauyuW2nd4fnFAautFxpw/Q0yjXTBbMAwG
|
||||
A1UdEwQFMAMBAf8wHQYDVR0OBBYEFL/PiFFjjlzVtExXMb2uXOfIgeIEMB8GA1Ud
|
||||
IwQYMBaAFL/PiFFjjlzVtExXMb2uXOfIgeIEMAsGA1UdDwQEAwIBBjAKBggqhkjO
|
||||
PQQDAgNJADBGAiEA0HOxloLMr87yDoH3CljWDWb7M2zLA+BQFXLN511qDl0CIQDu
|
||||
clewWaJHw4Wq8IN3JsrNDDw2GfrN3sx4hfWUK/0SPw==
|
||||
-----END CERTIFICATE-----
|
||||
7
meta-integrity/data/debug-keys/ima-local-ca.priv
Normal file
7
meta-integrity/data/debug-keys/ima-local-ca.priv
Normal file
@@ -0,0 +1,7 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAhinM5KnV2x5wICCAAw
|
||||
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI4Xbw/W1pgH0EgZCiurgCTUEIDbiK
|
||||
x5kw3/Rg1/ZLwk5TEiMoIa9CmXEyuSRUla/Ta4o/rZEzKAp6vwkcupviirtWYems
|
||||
lZNfggfzITWNEWtkU6BrhZgJ7kaeZrIbuAO7YUJy6Z2MQfgaKI9BE2EEgKJ+X5gY
|
||||
LjkobSAtEqDjuheLgaXIMQ7/qT0MGmi6LmzwMEhu8ZXlNGg8udw=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
@@ -1,16 +1,5 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAJw2G3d0fM36rcQU
|
||||
Bt8V/SapJe0lxWJ+CY+HcMx8AhWY9XQ66AXcqBsRHiUnYCaFGXFI35VKGC6d/Gs6
|
||||
IWlHgI0tcTyzy5eul+BKRLy/3PNjkK2jJETlbetQy+gE6gUtg4RmPV5ALGksK74p
|
||||
OrAfKnahoMi82NVIiBitwmRimms1AgMBAAECgYBTxciRFU1hAVBy2PKebKJoO0n1
|
||||
lc329fSWnmHlp5NOlcr8XCLWEfGtIk7ySd2MitCMKjKNU0EIrv0RXAlS9l9/gBYW
|
||||
HY+eEaa6l80sp8q4aPKImSi0pb3LVNqWKXJg8qr4AZ45/TEL/fzILFv5QcY8xDjV
|
||||
aj6DOlEnNDjlBlBbQQJBAMyYDlKItes/Rnmtp9roXj3XUfiBDHTLY2HVgDBe87sA
|
||||
TOSnbgIv+6urd1h9XvBmJlRYH7YKJmBSZWcSlfdC6XkCQQDDdfkUMxQZo9PC/Eue
|
||||
WYzytx4xUm3ItWcuKILtFgcNh3c4s4dMx4X/WhQj5/H/nVOIWDioQ0mrW3ap/qcb
|
||||
SBydAkAf/gb/UPFhf9t9W3JMANn7wZfHzCYufT9lJQWOisqCC2H6v1Osc+Rey8k1
|
||||
xST7Yn3L4pvS03N8zGWe4IEi0QvBAkAWdTWbNos2rvYjzy05Enz5XkTf0eK/Tuh+
|
||||
CzWP3BoPWeM+5pHDJqGkx0rNHVdW0VLJtak83A5Y2/d0bMfygISZAkBFGui4HW+Q
|
||||
1BlpmDeslsE11wm5jSmm6Ti12a2dVKGFo9QLQcSj4bfgxtqU2dQaYRmajXtSBrGQ
|
||||
3vVaxg2EfqB1
|
||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmbPxV5LYZ530IfGm
|
||||
SMpfPQFgoIkKPMRuNWLyVn+wiAOhRANCAAQ31W5ZQZdcwidgpyls2oO5rSsHLlqj
|
||||
cKYaDF2fveMN5L/wBwEi84ubzz2+MkM9q7RaOSC4TPYHnhVvYcH+SsFv
|
||||
-----END PRIVATE KEY-----
|
||||
|
||||
Binary file not shown.
@@ -20,7 +20,6 @@ CAKEY=${2:-ima-local-ca.priv}
|
||||
|
||||
cat << __EOF__ >$GENKEY
|
||||
[ req ]
|
||||
default_bits = 1024
|
||||
distinguished_name = req_distinguished_name
|
||||
prompt = no
|
||||
string_mask = utf8only
|
||||
@@ -36,13 +35,15 @@ basicConstraints=critical,CA:FALSE
|
||||
#basicConstraints=CA:FALSE
|
||||
keyUsage=digitalSignature
|
||||
#keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
extendedKeyUsage=critical,codeSigning
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid
|
||||
#authorityKeyIdentifier=keyid,issuer
|
||||
__EOF__
|
||||
|
||||
openssl req -new -nodes -utf8 -sha1 -days 365 -batch -config $GENKEY \
|
||||
-out csr_ima.pem -keyout privkey_ima.pem
|
||||
openssl x509 -req -in csr_ima.pem -days 365 -extfile $GENKEY -extensions v3_usr \
|
||||
openssl req -new -nodes -utf8 -sha256 -days 36500 -batch -config $GENKEY \
|
||||
-out csr_ima.pem -keyout privkey_ima.pem \
|
||||
-newkey ec -pkeyopt ec_paramgen_curve:prime256v1
|
||||
openssl x509 -req -in csr_ima.pem -days 36500 -extfile $GENKEY -extensions v3_usr \
|
||||
-CA $CA -CAkey $CAKEY -CAcreateserial \
|
||||
-outform DER -out x509_ima.der
|
||||
|
||||
@@ -18,7 +18,6 @@ GENKEY=ima-local-ca.genkey
|
||||
|
||||
cat << __EOF__ >$GENKEY
|
||||
[ req ]
|
||||
default_bits = 2048
|
||||
distinguished_name = req_distinguished_name
|
||||
prompt = no
|
||||
string_mask = utf8only
|
||||
@@ -33,10 +32,11 @@ emailAddress = john.doe@example.com
|
||||
basicConstraints=CA:TRUE
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid:always,issuer
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
keyUsage = cRLSign, keyCertSign
|
||||
__EOF__
|
||||
|
||||
openssl req -new -x509 -utf8 -sha1 -days 3650 -batch -config $GENKEY \
|
||||
openssl req -new -x509 -utf8 -sha256 -days 36500 -batch -config $GENKEY \
|
||||
-newkey ec -pkeyopt ec_paramgen_curve:prime256v1 \
|
||||
-outform DER -out ima-local-ca.x509 -keyout ima-local-ca.priv
|
||||
|
||||
openssl x509 -inform DER -in ima-local-ca.x509 -out ima-local-ca.pem
|
||||
|
||||
@@ -1,41 +0,0 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# Copied from ima-evm-utils.
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the terms of the GNU General Public License
|
||||
# version 2 as published by the Free Software Foundation.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
GENKEY=ima.genkey
|
||||
|
||||
cat << __EOF__ >$GENKEY
|
||||
[ req ]
|
||||
default_bits = 1024
|
||||
distinguished_name = req_distinguished_name
|
||||
prompt = no
|
||||
string_mask = utf8only
|
||||
x509_extensions = myexts
|
||||
|
||||
[ req_distinguished_name ]
|
||||
O = example.com
|
||||
CN = meta-intel-iot-security example signing key
|
||||
emailAddress = john.doe@example.com
|
||||
|
||||
[ myexts ]
|
||||
basicConstraints=critical,CA:FALSE
|
||||
keyUsage=digitalSignature
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid
|
||||
__EOF__
|
||||
|
||||
openssl req -new -nodes -utf8 -sha1 -days 36500 -batch \
|
||||
-x509 -config $GENKEY \
|
||||
-outform DER -out x509_ima.der -keyout privkey_ima.pem
|
||||
Reference in New Issue
Block a user