Status - lumag/digsig2-tools GitHub Wiki

DigSig2 status

Proof of Concept stage

  • Support for detached signatures only
  • No cache, no revoking, etc
  • File fully read to memory before validation
  • Simple tools that allow only basic testing

How-To

  • Userspace:
    • Build target filesystem and mount it locally
    • Clone and build tools
    • Use keys.sh to generate CA and signing keys
    • Use sign tool to sign binaries:
./sign signcert.crt signcert.key /srv/nfs/sid/lib/x86_64-linux-gnu/ld-2.27.so /srv/nfs/sid/lib/x86_64-linux-gnu/ld-2.27.so.der
./sign signcert.crt signcert.key /srv/nfs/sid/lib/x86_64-linux-gnu/libc-2.27.so /srv/nfs/sid/lib/x86_64-linux-gnu/libc-2.27.so.der
./sign signcert.crt signcert.key /srv/nfs/sid/lib/x86_64-linux-gnu/libdl-2.27.so /srv/nfs/sid/lib/x86_64-linux-gnu/libdl-2.27.so.der
./sign signcert.crt signcert.key /srv/nfs/sid/lib/x86_64-linux-gnu/libtinfo.so.5.9 /srv/nfs/sid/lib/x86_64-linux-gnu/libtinfo.so.5.9.der
./sign signcert.crt signcert.key /srv/nfs/sid/bin/dash /srv/nfs/sid/bin/dash.der
./sign signcert.crt signcert.key /srv/nfs/sid/bin/bash /srv/nfs/sid/bin/bash.der
./sign signcert.crt signcert.key /srv/nfs/sid/bin/sash /srv/nfs/sid/bin/sash.der
  • Kernel:
    • Use modified kernel
    • Enable CONFIG_SECURITY_DIGSIG2
    • Pass path to ca.crt as CONFIG_DIGSIG2_TRUSTED_KEYS
    • Pass security=digsig init=/bin/bash as boot parameters
    • Signed binaries and libraries will work. Unsigned ones will segfault