Question on signing the IMA signing key for kernel trusted keyrings?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

We know that IMA or EVM signing key must be signed by the .builtin_trusted_keys.
In the .builtin_trusted_keys keyring of a fresh CentOS, for example,
there are public keys created by CentOS. And the private key counterparts
were not available publicly. So I think there is technically no way for
others to sign the IMA or EVM key by the private keys of those CA.

Is there a possibility of getting the IMA or EVM signing keys signed
(probably by the public key in .builtin_trusted_keys) without rolling own
CA and re-gen the kernel?

Thanks,
Clay



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux