On 4/7/26 7:00 PM, Chris Lamb wrote:
Hi all,

Please review the draft for March's Reproducible Builds report:

   https://reproducible-builds.org/reports/2026-03/?draft

hey! :)

> Linux kernel’s signature-based integrity checking to be replaced?

This may cause a little bit of an upstir (for better or worse), it's not "we add one feature and remove another one", they are controls you can reach for that are meant to co-exist, and it ultimately depends on the person configuring your kernel.

You MAY configure it with private keys and signatures the way things are today.

You MAY configure it with both a hash-based allow-list and a private-key escape hatch for out-of-tree modules.

You MAY configure a fully nothing-up-my-sleeve kernel, with the source code being the absolute source (heh) of truth what code may or may not get accepted by the kernel, without deferring the security problem to a private key that you then need to worry about.

You MAY technically also configure a kernel that uses neither, and CAP_SYS_MODULE being the only security control.

cheers,
kpcyrd

Reply via email to