[GIT PULL] integrity subsystem updates for v5.4

Mimi Zohar zohar at linux.ibm.com
Mon Sep 16 22:13:02 UTC 2019


On Mon, 2019-09-16 at 13:38 -0700, Linus Torvalds wrote:
> On Wed, Sep 11, 2019 at 2:29 PM Mimi Zohar <zohar at linux.ibm.com> wrote:
> >
> > The major feature in this pull request is IMA support for measuring
> > and appraising appended file signatures.  In addition are a couple of
> > bug fixes and code cleanup to use struct_size().
> 
> How is the file signature any different from (and/or better than) the
> fs-verity support?
> 
> The fs-verity support got fairly extensively discussed, and is
> apparently going to actually be widely used by Android, and it an
> independent feature of any security model.
> 
> What does the IMA version bring to the table?

IMA currently defines a system wide policy for measuring, verifying a
file's integrity (both mutable/immutable files) against known good
values, and adding audit records containing the file hashes.  The
policy isn't hard coded in the kernel, allowing people/companies to
configure it as desired for their specific use case.

Support for appended signatures already exists in the kernel for
kernel modules.  This pull request adds IMA support for appended
signatures in order to verify the kexec kernel image on OpenPOWER, as
part of Secure and Trusted boot enablement.  This would allow distros
to sign kernel images similar to how they currently sign kernel
modules.

IMA verifies file signatures up front, before allowing access to the
file.  fs-verity verifies the signature of the Merkle tree (and other
info), but does not verify the file data at the time of first use.
 There are pros and cons to each of these approaches.

Mimi



More information about the Linux-security-module-archive mailing list