Move fs-verity signature check from kernel to install
This unblocks the deprecation of fs-verity kernel keyring. With an APK is installed with .fsv_sig, the signature was installed to the filesystem to be verified with a kernel keyring. Due to the current threat model of root or system server, checking the signature in kernel is not superior since the attacker can simply strip fs-verity protection from the file. The userspace check should be done anyway if the keyring contains multiple keys. Without regressing any security guarantee, this change moves the signature check to (only) install time. FileIntegrityService already holds the certificates and facilitates the signature check. In order to keep the test passing, FileIntegrityService now supports (debug only) cmd for adding and removing a debug cert. Bug: 258708453 Test: ApkVerityTest Test: CtsAppSecurityHostTestCases:android.appsecurity.cts.ApkVerityInstallTest Test: ChecksumsTest Change-Id: I737f058229928f1b242612631a13c62709b06d33
Loading
Please register or sign in to comment