Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Skip to content
Commit 4bdb6e5e authored by Victor Hsieh's avatar Victor Hsieh
Browse files

Move fs-verity signature check from kernel to install

This unblocks the deprecation of fs-verity kernel keyring.

With an APK is installed with .fsv_sig, the signature was installed to
the filesystem to be verified with a kernel keyring. Due to the current
threat model of root or system server, checking the signature in kernel
is not superior since the attacker can simply strip fs-verity protection
from the file. The userspace check should be done anyway if the keyring
contains multiple keys.

Without regressing any security guarantee, this change moves the
signature check to (only) install time. FileIntegrityService already
holds the certificates and facilitates the signature check.

In order to keep the test passing, FileIntegrityService now supports
(debug only) cmd for adding and removing a debug cert.

Bug: 258708453
Test: ApkVerityTest
Test: CtsAppSecurityHostTestCases:android.appsecurity.cts.ApkVerityInstallTest
Test: ChecksumsTest

Change-Id: I737f058229928f1b242612631a13c62709b06d33
parent cc6f6e08
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment