stap-authorize-signing-cert (8) - Linux Manuals

stap-authorize-signing-cert: systemtap signing authorization utility


stap-authorize-signing-cert - systemtap signing authorization utility


stap-authorize-signing-cert CERTFILE [ DIRNAME ]


The staprun program will load modules for members of the group stapusr if they are signed by a trusted signer. A trusted signer is usually a systemtap compile server which signs modules when the client (stap-client) specifies the --unprivileged option.

The trustworthiness of a given signer can not be determined automatically without a trusted certificate authority issuing systemtap signing certificates. This is not practical in everyday use and so, staprun must authenticate servers against its own database of trusted signers. In this context, establishing a given signer as trusted means adding that signer[aq]s certificate to staprun[aq]s database of trusted signers.

The stap-authorize-signing-cert program adds the given signing certificate to the given certificate database, making that signer a trusted server for staprun when using that database.


The stap-authorize-signing-cert program accepts two arguments:

This is the name of the file containing the certificate of the new trusted signer. For systemtap compile servers, this is the file named stap.cert which can be found in the server[aq]s certificate database. On the server host, for servers started by the stap-server service, this database can be found in /var/lib/stap-server/.systemtap/ssl/server/. For servers run by other non-root users, this database can be found in $HOME/.systemtap/ssl/server/. For root users (EUID=0), it can be found in the stappaths (7) manual page.

This optional argument is the name of the directory containing the certificate database to which the certificate is to be added. If not specified, the default can be found in the stappaths (7) manual page. That is, the default result is that all users on the local host will trust this signer. Note that this default directory is only writable by root.


Systemtap is an administrative tool. It exposes kernel internal data structures and potentially private user information. See the stap(1) manual page for additional information on safety and security.

Systemtap uses Network Security Services (NSS) for module signing and verification. The NSS tool certutil is used for the generation of certificates. The related certificate databases must be protected in order to maintain the security of the system. Use of the utilities provided will help to ensure that the proper protection is maintained. staprun will check for proper access permissions before making use of any certificate database.


Signing certificate for servers started by the stap-server service.


Use the Bugzilla link of the project web page or our mailing list., <systemtap [at]>.


stap(1), stappathss(7), staprun(8), stap-server(8), stap-client(8), NSS, certutil