Skip to content

Tags: ansasaki/keylime

Tags

v6.2.1

Toggle v6.2.1's commit message
Update runtime_ima.rst

1. Update the url of create_allowlist.sh
2. Update the usage of create_allowlist.sh

Signed-off-by: Coiby Xu <[email protected]>

v6.2.0

Toggle v6.2.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Merge pull request keylime#743 from THS-on/agent-hash-ek

agent: ensure that EK is in PEM format when used as uuid

6.1.1

Toggle 6.1.1's commit message
tenant: do_cvdelete wait until 404

do_cvdelete sends a delete request, and if received a 202 response
(accepted), actively iterate until the next get receives a 200 or 404.

The issue is that a get of 200 imply that the object is still available,
that causes the "update" operation to fail a bit later (update is a
delete followed of an add, and this last action will fail if the object
is still present)

This patch change the active polling to consider the agent deleted only
when a 404 is received.

Fix keylime#711

Signed-off-by: Alberto Planas <[email protected]>

6.1.0

Toggle 6.1.0's commit message
Update python cryptography lib to v3.3.2

Fixes issue keylime#581

Signed-off-by: Michael Peters <[email protected]>

6.0.1

Toggle 6.0.1's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Remove TPM1.2 specifics from README (keylime#561)

Signed-off-by: Luke Hinds <[email protected]>

6.0.0

Toggle 6.0.0's commit message
Fix CVE-2021-3406

This ensures we verify the EK and AIK we get from the agent before
trusting signatures by it.

Advisory: GHSA-78f8-6c68-375m
For details, see https://patrick.uiterwijk.org/blog/tpm2-attestation-keylime-vulnerability
Signed-off-by: Patrick Uiterwijk <[email protected]>
Signed-off-by: Michael Peters <[email protected]>

5.8.1

Toggle 5.8.1's commit message
ima: Count for bad file signatures in separate error field

Extend the err array with another field and account for bad file signatures
in err[3]. We move prior usage of err[3] to err[4] where the good
entries are counted and now sum over 4 error fields rather than 3.

Signed-off-by: Stefan Berger <[email protected]>

v5.8.1

Toggle v5.8.1's commit message
ima: Count for bad file signatures in separate error field

Extend the err array with another field and account for bad file signatures
in err[3]. We move prior usage of err[3] to err[4] where the good
entries are counted and now sum over 4 error fields rather than 3.

Signed-off-by: Stefan Berger <[email protected]>

5.8.0

Toggle 5.8.0's commit message
ima: Return None in case there was no keyring in the DB

This patch fixes the following issue on the verifier side when no
string representation of an IMA keyring is found in the DB.

2021-01-20 15:58:55.083 - keylime.tpm2 - INFO - TPM2-TOOLS Version: 5.0
2021-01-20 15:58:55.084 - keylime.cloudverifier - ERROR - list indices must be integers or slices, not str
Traceback (most recent call last):
  File "/usr/local/lib/python3.8/site-packages/keylime-0.0.0-py3.8.egg/keylime/cloud_verifier_tornado.py", line 437, in invoke_get_quote
    if cloud_verifier_common.process_quote_response(agent, json_response['results']):
  File "/usr/local/lib/python3.8/site-packages/keylime-0.0.0-py3.8.egg/keylime/cloud_verifier_common.py", line 202, in process_quote_response
    ima_keyring = ima_file_signatures.ImaKeyring.from_string(agent['ima_sign_verification_keys'])
  File "/usr/local/lib/python3.8/site-packages/keylime-0.0.0-py3.8.egg/keylime/ima_file_signatures.py", line 200, in from_string
    for der_key in ImaKeyring._base64_to_der_keylist(obj['pubkeys']):
TypeError: list indices must be integers or slices, not str

Signed-off-by: Stefan Berger <[email protected]>

v4.0.1

Toggle v4.0.1's commit message
Enable Github plugin for semantic-release