Start creating base images
This commit is contained in:
39
files/scripts/sign-check.sh
Normal file
39
files/scripts/sign-check.sh
Normal file
@@ -0,0 +1,39 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# Copyright 2025 Universal Blue
|
||||
# Copyright 2025 The Secureblue Authors
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software distributed under the License is
|
||||
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and limitations under the License.
|
||||
|
||||
set -oue pipefail
|
||||
|
||||
KERNEL="$1"
|
||||
module="$2"
|
||||
PUBLIC_CERT="$3"
|
||||
|
||||
kmod_sig="/tmp/kmod.sig"
|
||||
kmod_p7s="/tmp/kmod.p7s"
|
||||
kmod_data="/tmp/kmod.data"
|
||||
/usr/src/kernels/"${KERNEL}"/scripts/extract-module-sig.pl -s "${module}" > "${kmod_sig}"
|
||||
openssl pkcs7 -inform der -in "${kmod_sig}" -out "${kmod_p7s}"
|
||||
/usr/src/kernels/"${KERNEL}"/scripts/extract-module-sig.pl -0 "${module}" > "${kmod_data}"
|
||||
if openssl cms -verify -binary -inform PEM \
|
||||
-in "${kmod_p7s}" \
|
||||
-content "${kmod_data}" \
|
||||
-certfile "${PUBLIC_CERT}" \
|
||||
-out "/dev/null" \
|
||||
-nointern -noverify
|
||||
then
|
||||
echo "Signature Verified for ${module}"
|
||||
else
|
||||
echo "Signature Failed for ${module}"
|
||||
exit 1
|
||||
fi
|
||||
26
files/scripts/signkernel.sh
Normal file
26
files/scripts/signkernel.sh
Normal file
@@ -0,0 +1,26 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# Copyright 2025 Universal Blue
|
||||
# Copyright 2025 The Secureblue Authors
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software distributed under the License is
|
||||
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and limitations under the License.
|
||||
|
||||
set -oue pipefail
|
||||
|
||||
KERNEL_VERSION="$(rpm -q "kernel" --queryformat '%{VERSION}-%{RELEASE}.%{ARCH}')"
|
||||
|
||||
PUBLIC_KEY_DER_PATH="../system/etc/pki/akmods/certs/akmods-secureblue.der"
|
||||
PUBLIC_KEY_CRT_PATH="./certs/public_key.crt"
|
||||
PRIVATE_KEY_PATH="/tmp/certs/private_key.priv"
|
||||
|
||||
openssl x509 -in "$PUBLIC_KEY_DER_PATH" -out "$PUBLIC_KEY_CRT_PATH"
|
||||
sbsign --cert "$PUBLIC_KEY_CRT_PATH" --key "$PRIVATE_KEY_PATH" /usr/lib/modules/"${KERNEL_VERSION}"/vmlinuz --output /usr/lib/modules/"${KERNEL_VERSION}"/vmlinuz
|
||||
sbverify --list /usr/lib/modules/"${KERNEL_VERSION}"/vmlinuz
|
||||
55
files/scripts/signmodules.sh
Normal file
55
files/scripts/signmodules.sh
Normal file
@@ -0,0 +1,55 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# Copyright 2025 Universal Blue
|
||||
# Copyright 2025 The Secureblue Authors
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software distributed under the License is
|
||||
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and limitations under the License.
|
||||
|
||||
set -oue pipefail
|
||||
|
||||
MODULE_NAME="${1-}"
|
||||
if [ -z "$MODULE_NAME" ]; then
|
||||
echo "MODULE_NAME is empty. Exiting..."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
KERNEL_VERSION="$(rpm -q "kernel" --queryformat '%{VERSION}-%{RELEASE}.%{ARCH}')"
|
||||
|
||||
PUBLIC_KEY_DER_PATH="../system/etc/pki/akmods/certs/akmods-secureblue.der"
|
||||
PUBLIC_KEY_CRT_PATH="./certs/public_key.crt"
|
||||
PRIVATE_KEY_PATH="/tmp/certs/private_key.priv"
|
||||
openssl x509 -in "$PUBLIC_KEY_DER_PATH" -out "$PUBLIC_KEY_CRT_PATH"
|
||||
|
||||
PRIVATE_KEY_PATH="/tmp/certs/private_key.priv"
|
||||
SIGNING_KEY="./certs/signing_key.pem"
|
||||
cat "$PRIVATE_KEY_PATH" <(echo) "$PUBLIC_KEY_CRT_PATH" >> "$SIGNING_KEY"
|
||||
|
||||
for module in /usr/lib/modules/"${KERNEL_VERSION}"/extra/"${MODULE_NAME}"/*.ko*; do
|
||||
module_basename="${module:0:-3}"
|
||||
module_suffix="${module: -3}"
|
||||
if [[ "$module_suffix" == ".xz" ]]; then
|
||||
xz --decompress "$module"
|
||||
openssl cms -sign -signer "${SIGNING_KEY}" -binary -in "$module_basename" -outform DER -out "${module_basename}.cms" -nocerts -noattr -nosmimecap
|
||||
/usr/src/kernels/"${KERNEL_VERSION}"/scripts/sign-file -s "${module_basename}.cms" sha256 "${PUBLIC_KEY_CRT_PATH}" "${module_basename}"
|
||||
/bin/bash ./sign-check.sh "${KERNEL_VERSION}" "${module_basename}" "${PUBLIC_KEY_CRT_PATH}"
|
||||
xz -C crc32 -f "${module_basename}"
|
||||
elif [[ "$module_suffix" == ".gz" ]]; then
|
||||
gzip -d "$module"
|
||||
openssl cms -sign -signer "${SIGNING_KEY}" -binary -in "$module_basename" -outform DER -out "${module_basename}.cms" -nocerts -noattr -nosmimecap
|
||||
/usr/src/kernels/"${KERNEL_VERSION}"/scripts/sign-file -s "${module_basename}.cms" sha256 "${PUBLIC_KEY_CRT_PATH}" "${module_basename}"
|
||||
/bin/bash ./sign-check.sh "${KERNEL_VERSION}" "${module_basename}" "${PUBLIC_KEY_CRT_PATH}"
|
||||
gzip -9f "${module_basename}"
|
||||
else
|
||||
openssl cms -sign -signer "${SIGNING_KEY}" -binary -in "$module" -outform DER -out "${module}.cms" -nocerts -noattr -nosmimecap
|
||||
/usr/src/kernels/"${KERNEL_VERSION}"/scripts/sign-file -s "${module}.cms" sha256 "${PUBLIC_KEY_CRT_PATH}" "${module}"
|
||||
/bin/bash ./sign-check.sh "${KERNEL_VERSION}" "${module}" "${PUBLIC_KEY_CRT_PATH}"
|
||||
fi
|
||||
done
|
||||
Reference in New Issue
Block a user