Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature request: Debian package - kernel module signing for kernel_lockdown #113

Closed
adrelanos opened this issue Aug 21, 2021 · 3 comments
Closed
Labels
enhancement New feature or request

Comments

@adrelanos
Copy link
Contributor

DKMS supports it:

But how to use it? Is this something to be implemented per kernel module? Or is this a sysadmin task?

//cc @morfikov

Would you know how to implement this?

@morfikov
Copy link
Contributor

It depends on your setup. For instance, I deleted the preinstalled EFI keys form my laptop's firmware and installed there my own keys instead, so only the code I sign can run on my machine. I sign every kernel I build using my private key. I don't sign modules, because I have all the needed things built into the kernel. But if I wanted to build some external module via dkms I could sign it automatically using DKMS. Some time ago I wrote an article on this subject. it's in Polish, but all the necessary commands are in place and you will figure out how to make that setup work.

@solardiz solardiz added the enhancement New feature or request label Nov 14, 2021
@Adam-pi3
Copy link
Collaborator

@solardiz @adrelanos I'm not sure there is anything which we as LKRG can do, can we?

@adrelanos
Copy link
Contributor Author

I guess this would have to be done in DKMS or by the distribution to apply for all kernel modules.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants