mbox series

[SRU,J/M,0/1] UBUNTU: [Packaging] Check for relevant changes for security certifications

Message ID 20230831160511.495067-1-magali.lemes@canonical.com
Headers show
Series UBUNTU: [Packaging] Check for relevant changes for security certifications | expand

Message

Magali Lemes Aug. 31, 2023, 4:05 p.m. UTC
BugLink: https://bugs.launchpad.net/bugs/1945989

[Impact]

When producing a new version of some kernels, we need to check for
changes that might affect FIPS or other certs and justify why a commit
was kept or removed.

To simplify this process we can add an automated check that will abort
the kernel preparation and build when such changes exist without a
justification.

[Test Plan]

Check if the kernel preparation fails (cranky close) when any of the files
specified by `crypto_files` is changed.

[Where problems could occur]

No kernels should be affected unless we enable this check by setting
`do_fips_checks` to true. In the generic Jammy kernel, `do_fips_checks` is
already set to false in `debian/rules.d/0-common-vars.mk`. Even if the variable
is set to true, that only affects the kernel preparation and not the
resulting kernel.

Marcelo Henrique Cerri (1):
  UBUNTU: [Packaging] Add a new fips-checks script

 debian/scripts/misc/fips-checks | 138 ++++++++++++++++++++++++++++++++
 1 file changed, 138 insertions(+)
 create mode 100755 debian/scripts/misc/fips-checks

Comments

Roxana Nicolescu Sept. 1, 2023, 8:32 a.m. UTC | #1
On 31/08/2023 18:05, Magali Lemes wrote:
> BugLink: https://bugs.launchpad.net/bugs/1945989
>
> [Impact]
>
> When producing a new version of some kernels, we need to check for
> changes that might affect FIPS or other certs and justify why a commit
> was kept or removed.
>
> To simplify this process we can add an automated check that will abort
> the kernel preparation and build when such changes exist without a
> justification.
>
> [Test Plan]
>
> Check if the kernel preparation fails (cranky close) when any of the files
> specified by `crypto_files` is changed.
>
> [Where problems could occur]
>
> No kernels should be affected unless we enable this check by setting
> `do_fips_checks` to true. In the generic Jammy kernel, `do_fips_checks` is
> already set to false in `debian/rules.d/0-common-vars.mk`. Even if the variable
> is set to true, that only affects the kernel preparation and not the
> resulting kernel.
>
> Marcelo Henrique Cerri (1):
>    UBUNTU: [Packaging] Add a new fips-checks script
>
>   debian/scripts/misc/fips-checks | 138 ++++++++++++++++++++++++++++++++
>   1 file changed, 138 insertions(+)
>   create mode 100755 debian/scripts/misc/fips-checks
>

LGMT, but what about lunar?

Acked-by: Roxana Nicolescu <roxana.nicolescu@canonical.com>
Tim Gardner Sept. 1, 2023, 12:26 p.m. UTC | #2
On 8/31/23 10:05 AM, Magali Lemes wrote:
> BugLink: https://bugs.launchpad.net/bugs/1945989
> 
> [Impact]
> 
> When producing a new version of some kernels, we need to check for
> changes that might affect FIPS or other certs and justify why a commit
> was kept or removed.
> 
> To simplify this process we can add an automated check that will abort
> the kernel preparation and build when such changes exist without a
> justification.
> 
> [Test Plan]
> 
> Check if the kernel preparation fails (cranky close) when any of the files
> specified by `crypto_files` is changed.
> 
> [Where problems could occur]
> 
> No kernels should be affected unless we enable this check by setting
> `do_fips_checks` to true. In the generic Jammy kernel, `do_fips_checks` is
> already set to false in `debian/rules.d/0-common-vars.mk`. Even if the variable
> is set to true, that only affects the kernel preparation and not the
> resulting kernel.
> 
> Marcelo Henrique Cerri (1):
>    UBUNTU: [Packaging] Add a new fips-checks script
> 
>   debian/scripts/misc/fips-checks | 138 ++++++++++++++++++++++++++++++++
>   1 file changed, 138 insertions(+)
>   create mode 100755 debian/scripts/misc/fips-checks
> 
Acked-by: Tim Gardner <tim.gardner@canonical.com>
Magali Lemes do Sacramento Sept. 1, 2023, 12:50 p.m. UTC | #3
On 01/09/2023 05:32, Roxana Nicolescu wrote:
> 
> On 31/08/2023 18:05, Magali Lemes wrote:
>> BugLink: https://bugs.launchpad.net/bugs/1945989
>>
>> [Impact]
>>
>> When producing a new version of some kernels, we need to check for
>> changes that might affect FIPS or other certs and justify why a commit
>> was kept or removed.
>>
>> To simplify this process we can add an automated check that will abort
>> the kernel preparation and build when such changes exist without a
>> justification.
>>
>> [Test Plan]
>>
>> Check if the kernel preparation fails (cranky close) when any of the 
>> files
>> specified by `crypto_files` is changed.
>>
>> [Where problems could occur]
>>
>> No kernels should be affected unless we enable this check by setting
>> `do_fips_checks` to true. In the generic Jammy kernel, 
>> `do_fips_checks` is
>> already set to false in `debian/rules.d/0-common-vars.mk`. Even if the 
>> variable
>> is set to true, that only affects the kernel preparation and not the
>> resulting kernel.
>>
>> Marcelo Henrique Cerri (1):
>>    UBUNTU: [Packaging] Add a new fips-checks script
>>
>>   debian/scripts/misc/fips-checks | 138 ++++++++++++++++++++++++++++++++
>>   1 file changed, 138 insertions(+)
>>   create mode 100755 debian/scripts/misc/fips-checks
>>
> 
> LGMT, but what about lunar?

We only have FIPS kernels based on LTS kernels. I sent this to Mantic 
too so that the next LTS kernel carries this script.

> 
> Acked-by: Roxana Nicolescu <roxana.nicolescu@canonical.com>
>
Magali Lemes Sept. 6, 2023, 9:04 p.m. UTC | #4
The way `tag_prefix` is defined does not take into account 1st order 
derivatives. I will send a v2 fixing this.

On 31/08/2023 13:05, Magali Lemes wrote:
> BugLink: https://bugs.launchpad.net/bugs/1945989
>
> [Impact]
>
> When producing a new version of some kernels, we need to check for
> changes that might affect FIPS or other certs and justify why a commit
> was kept or removed.
>
> To simplify this process we can add an automated check that will abort
> the kernel preparation and build when such changes exist without a
> justification.
>
> [Test Plan]
>
> Check if the kernel preparation fails (cranky close) when any of the files
> specified by `crypto_files` is changed.
>
> [Where problems could occur]
>
> No kernels should be affected unless we enable this check by setting
> `do_fips_checks` to true. In the generic Jammy kernel, `do_fips_checks` is
> already set to false in `debian/rules.d/0-common-vars.mk`. Even if the variable
> is set to true, that only affects the kernel preparation and not the
> resulting kernel.
>
> Marcelo Henrique Cerri (1):
>    UBUNTU: [Packaging] Add a new fips-checks script
>
>   debian/scripts/misc/fips-checks | 138 ++++++++++++++++++++++++++++++++
>   1 file changed, 138 insertions(+)
>   create mode 100755 debian/scripts/misc/fips-checks
>