Commit Graph

1633 Commits

Author SHA1 Message Date
Stefan Berger
76f1f539a6 ima: Sign all executables and the ima-policy in the root filesystem
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Stefan Berger
292b49342c ima: Rename IMA_EVM_POLICY_SYSTEMD to IMA_EVM_POLICY
The IMA policy will be specified using the IMA_EVM_POLICY variable since
systemd will not be involved in loading the policy but the init script will
load it.

Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Stefan Berger
f4f7624d2e ima: Fix the IMA kernel feature
Fix the IMA kernel feature. Remove outdated patches and add ima.cfg holding
kernel configuration options for IMA and EVM.

Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Stefan Berger
cb8f26d82a ima: Fix the ima_policy_appraise_all to appraise executables & libraries
Fix the ima_policy_appraise_all policy to appraise all executables
and libraries. Also update the list of files that are not appraised to not
appraise cgroup related files.

Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Stefan Berger
0652c9fd74 ima: Document and replace keys and adapt scripts for EC keys
For shorted file signatures use EC keys rather than RSA keys.
Document the debug keys and their purpose.
Adapt the scripts for creating these types of keys to now
create EC keys.

Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Alexander Kanavin
3b5fa74e77 maintainers.inc: rename to avoid clashes with oe-core
Additional maintainer entries should be added to ones provided by oe-core,
but not be replacing them, as that breaks oe-core tests.

Another option is to place them directly into recipes.

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
ae23806825 fscryptctl: update to 1.0.1
Don't build man as it needs pandoc

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
e92e4dadde suricata: update to 6.0.11
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
a6997dc78f libhtp: update to 0.5.43
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
68c03e6f8e ossec-hids: update to tip of 3.7.0
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
1a37cd7231 libtpm: update to 0.9.6
include: CVE-2023-1017 & CVE-2023-1018

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
bd02283430 swtpm: update to 0.8.0
includes CVE-2022-23645

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
617f0af2dc recipes-tpm: use this for common tpm recipes
a bit of re-org

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Armin Kuster
250b67fc6f meta-tpm: rename recipes-tpm to recipes-tpm1
a bit of re-org.

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Peter Kjellerstedt
04e4cc1121 tpm2-tools: Remove unnecessary and optional dependencies
* The dependency on autoconf-archive is only needed when building from
  the Git repository (and it should really be autoconf-archive-native).
* Removing the build dependency on tpm2-abrmd does not change the output
  in any way, i.e., nothing is used from it.
* The runtime dependency on libtss2 is added automatically by bitbake
  since /usr/bin/tpm2 is linked with libtss2-esys.so.0.
* The runtime dependency on tpm2-abrmd is optional. Such dependencies
  are better handled at a higher level, e.g., by depending on
  packagegroup-security-tpm2.

Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-06 07:54:09 -04:00
Anton Antonov
53c5cc794f Flush caches after OEQA tests
Make sure that all changes a saved after running the tests.

Signed-off-by: Anton Antonov <Anton.Antonov@arm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-14 11:23:06 -04:00
Anton Antonov
3b0659d50f Fix PACKAGECONFIG check in Parsec OEQA tests
If PACKAGECONFIG is not defined in local.conf then
its default value is not included in cls.tc.td map.

Signed-off-by: Anton Antonov <Anton.Antonov@arm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-12 07:45:25 -04:00
Armin Kuster
9d21e48053 parsec-service: fix SRC_URI hash
Fixes:
ERROR: Missing SRC_URI checksum, please add those to the recipe:
SRC_URI[parsec-service-1.2.0.sha256sum] = "f58e7ba859c22cc1904dc8298b1a7d94ee1ba3b4d4808f28e4cc0c96ddb149c9"

Needed to S dir too.

Signed-off-by: Armin Kuster <akuster808@gmail.com>

v2]
Fix patch applying
2023-04-12 07:45:25 -04:00
Armin Kuster
3d6ff465ce parsec-tool: update SRC_URI hash
FIxes:

ERROR: Missing SRC_URI checksum, please add those to the recipe:
SRC_URI[parsec-tool-0.6.0.sha256sum] = "f51d5d7f0caca1c335324b52482fa5edbf6c9cfd2e6865e5cb22716d52dcb367"

Needed to have the package version included in the name.

Fixes:
ERROR: parsec-tool-0.6.0-r0 do_populate_lic: QA Issue: parsec-tool: LIC_FILES_CHKSUM points to an invalid file:
and
error: manifest path `/home/akuster/oss/clean/poky/build/tmp/work/cortexa53-poky-linux/parsec-tool/0.6.0-r0/parsec-tool-0.6.0//Cargo.toml` does not exist

Set S to CARGO_VENDORING_DIRECTORY/BP to fix the LIC_FILES_CHKSUM and compile errors.

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-12 07:45:25 -04:00
Gowtham Suresh Kumar
f0d1f808b7 parsec-service: Update parsec recipes to 1.2.0 and parsec-tool to 0.6.0
Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-12 07:45:24 -04:00
Gowtham Suresh Kumar
cdd4295689 meta-parsec: Disable RSA-OAEP OEQA tests for Parsec PKCS11 backend
Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-12 07:45:24 -04:00
Patrick Williams
9d819c1242 libwhisker2-perl: adjust perl-version variable
The PERLVERSION likely has the wrong value in the native context
due to reasons discussed in openembedded-core[1].  The upstream
suggestion was to avoid use of PERLVERSION and switch to the direct
function.

1. https://lore.kernel.org/openembedded-core/20230405003850.384813-1-patrick@stwcx.xyz/T/#u

Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-08 10:49:38 -04:00
Armin Kuster
a149c85ce9 suricata: Missed on crate depends
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-08 10:49:38 -04:00
Armin Kuster
ffe3d73fad suricata: Fixup to work within the recent crate changes.
Had to delete some wonky Cargo.toml files to get update_crates to work.
Manually updated one crate to a newer version included by update_crates as it would not compile.
Manually applied several crates missed by update_crates.

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-08 10:49:38 -04:00
Armin Kuster
415424a706 krill: forced to inclued fetch hashes.
Now manditory via Poky commit: https://git.yoctoproject.org/poky/commit/bitbake/lib/bb/fetch2?id=4d9886e1435dba3785973cc920865f8ab67e644d

used cargo-update-recipe-crates to fixup

Drop krill.inc in favor of new crate file name

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-08 10:49:38 -04:00
Armin Kuster
ab80ee71de checksecurity: update to 2.0.16
Drop setuid-log-folder.patch, using sed instead.
Refresh patch check-setuid-use-more-portable-find-args.patch

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-08 10:49:38 -04:00
Peter Marko
a397a38ed9 tpm2-tss: correct CVE product
Currently CVE-2023-22745 does not show up in kirkstone CVE report.
This fixes that.

Products from yocto's CVE check NVD database:
sqlite> select * from products where product like "tpm2%";
CVE-2017-7524|tpm2-tools_project|tpm2.0-tools|||1.1.0|<=
CVE-2020-24455|tpm2_software_stack_project|tpm2_software_stack|||2.4.3|<
CVE-2020-24455|tpm2_software_stack_project|tpm2_software_stack|3.0.0|>=|3.0.1|<
CVE-2021-3565|tpm2-tools_project|tpm2-tools|5.1|>=|5.1.1|<
CVE-2021-3565|tpm2-tools_project|tpm2-tools|||4.3.2|<
CVE-2023-22745|tpm2_software_stack_project|tpm2_software_stack|||4.0.0|<=

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-26 16:02:15 -04:00
Mikko Rapeli
d50e7d70d9 ima-evm-utils: disable documentation from build
Building documentation fails due to missing asciidoc, xsltproc etc
so it's better to just disable building them by default.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-26 16:02:07 -04:00
Armin Kuster
4ed311eaf7 packagegroup-core-security: refactor the inclusion of krill
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-22 08:02:50 -04:00
Armin Kuster
6f7c5fe13f cryptmout: update to 6.2.0
Change LIC_FILES_CHKSUM to use COPYING

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:29 -04:00
Armin Kuster
883d5e4dd9 krill: update 0.12.3
refresh patch

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:29 -04:00
Armin Kuster
21d8a4a187 apparmor: update to 3.1.3
drop debian patch as the file was dropped upstream.

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:29 -04:00
Armin Kuster
b734cf77e2 suricata: update to 6.0.10
fixup another python file to use py3

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:29 -04:00
Armin Kuster
90feb1888d firejail: update 0.9.72
refresh patch

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:29 -04:00
Armin Kuster
d440752461 libmspack: update to 1.11
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:29 -04:00
Armin Kuster
206260ffd0 fscrypt: update to 1.1.0
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:30:15 -04:00
Armin Kuster
bb2b0f8710 chkrootkit: update to 0.57
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:57 -04:00
Armin Kuster
3e6a7c173a lkrg-modules: update to 0.9.6
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:57 -04:00
Armin Kuster
b68c6f160d libhtp: update to 0.5.42
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:57 -04:00
Armin Kuster
a9fb9bd209 python3-privacyidea: update to 3.8.1
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:57 -04:00
Armin Kuster
7289f368b2 python3-fail2ban: update to 1.0.2
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:57 -04:00
Armin Kuster
3effeff40d openscap git: add DEFAULT_PREFERENCE
This recipe is not maintained and will be dropped by the next LTS if nothing changes.

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:57 -04:00
Armin Kuster
9e2355106d openscap: update to 1.3.7
remove DEFAULT_PREFERENCE -1

The git version is unmaintained

Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:50 -04:00
Armin Kuster
c2c1a76b8d openscap: update to 1.3.6
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:29:31 -04:00
Kevin Hao
a7f73ab591 dm-verity-img.bbclass: Fix the hash offset alignment issue
When using the kernel module parameter "dm-mod.create=" [1] to create
the device-mapper device, the hash offset address we passed to kernel
module is the hash block number. That means the hash offset address
would have to be aligned to the max(data_block_size, hash_block_size),
otherwise there would be no way to set the correct hash offset address
via "dm-mo.create=".

[1] https://www.kernel.org/doc/Documentation/admin-guide/device-mapper/dm-init.rst

Signed-off-by: Kevin Hao <kexin.hao@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:27:24 -04:00
Paul Gortmaker
2b2b112b05 dm-verity: document board specifics for Beaglebone Black
This is meant to augment the generic dm-verity instructions with
the board specifics for this platform.

Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:27:24 -04:00
Paul Gortmaker
b6b483902a dm-verity: add basic non-arch/non-BSP yocto specific settings
As things stand currently, the only way to learn about the Yocto
specific settings for implementing dm-verity is by reading the source.

Here we try and capture some of the basic information that exists
out there in mailing list posts and get that in-tree.

Board specific settings/tips will be stored in board specific files.

Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:27:24 -04:00
Eero Aaltonen
4c786d4e09 dm-verity-img.bbclass: fix syntax warning
Fixes warning
```
SyntaxWarning: "is not" with a literal. Did you mean "!="?
```

Signed-off-by: Eero Aaltonen <eero.aaltonen@vaisala.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:27:24 -04:00
Paul Gortmaker
bd7a25c4dd dm-verity: update beaglebone wic to match meta-yocto
This file was forked from the generic (non verity) version in
meta-yocto, but it would seem that due to limited use, an update
in the parent never made it here, even after two years:

[commit 0c679ac53b52e631a7c961872ce58f5cf74b8629 in meta-yocto]

  From: Kevin Hao <kexin.hao@windriver.com>
  Date: Tue, 23 Mar 2021 17:35:29 +0800
  Subject: [PATCH] meta-yocto-bsp: beaglebone: Set a fixed size for boot
   partition in WIC image

  After the dosfstools has been updated to v4.2 by commit b522f24723e1
  ("dosfstools: update 4.1 -> 4.2"), the commit b29eb5be67e9 ("mkfs.fat:
  Align total number of sectors to be multiple of sectors per track") in
  v4.2 has caused a regression in beagebone black board. The reason is
  that the real total sectors of the fat filesystem created by the mkdosfs
  may not be the same size as what we requested due to align with the
  sectors per track, this change seem no side effect to linux kernel,
  but it breaks the beaglebone black boot ROM and make it can't load the
  MLO. In order to fix this issue, we choose to set a fixed size for the
  boot partition to make sure that the total sectors always are aligned
  with the sectors per track.

  [Yocto #14306]

Bring the same change across, so dm-verity doesn't face the same
frustrating silent boot failure with zero console output.

With this change in place, and allowing for read-only rootfs, we see:

device-mapper: verity: sha256 using implementation "sha256-generic"
EXT4-fs (dm-0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: disabled.
INIT: version 3.01 booting

Note that the above is from booting on real hardware on Kirkstone.

Cc: Kevin Hao <kexin.hao@windriver.com>
Cc: Niko Mauno <niko.mauno@vaisala.com>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:27:24 -04:00
Jose Quaresma
0e648bae9c meta-tpm/layer: lower the priority from 10 to 6
The priority change on sumo version without any description.
Since then is very hard to add in other layers a new version
of any recipe on this layer with such priority so these patch
reverts the priority back to 6.

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-20 16:27:24 -04:00