Should SKID be used as keyid in IMA signature?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



While kernel always trusts to X.509 SKID extension and using last 4 bytes
of it as keyid, ima-evm-utils is using SHA-1 to generate keyid from
a public key.

This becomes a problem if something different from SHA-1 was used to
generate SKID (e.g SHA-256). In this case, kernel will not be able to
verify produced IMA signature as there will be no available key with
such keyid.

So, do we need to provide means for using SKID from certificate as keyid
in ima-evm-utils?

Or is it the kernel who should always generate SHA-1-based keyid?



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux