Code signing, transport security, and runtime isolation
AlJefra OS downloads and executes driver code from the internet. The security model must ensure:
Every .ajdrv package includes a 64-byte Ed25519 signature over the package contents (excluding the signature itself).
AlJefra Root Key (offline, HSM)
└→ Signs: Store Signing Key
└→ Signs: Individual .ajdrv packages
The OS image ships with the Store Signing Key's public key (32 bytes).
1. Download .ajdrv from marketplace
2. Parse header, extract signature offset
3. Compute SHA-512 over signed region
4. Verify Ed25519 signature using Store public key
5. If valid: proceed to load driver
6. If invalid: reject, log error
All marketplace communication uses TLS 1.2 via BearSSL:
The marketplace domain (api.aljefra.com) uses certificate pinning:
In the exokernel model, drivers run in the same address space as the kernel. Protection relies on:
Phase 5 will add:
.ajdrv packages.ajdrv with source code