<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://kernsec.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Linux_Security_Summit_2014%2FAbstracts%2FSafford</id>
	<title>Linux Security Summit 2014/Abstracts/Safford - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://kernsec.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Linux_Security_Summit_2014%2FAbstracts%2FSafford"/>
	<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Safford&amp;action=history"/>
	<updated>2026-04-29T09:56:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Safford&amp;diff=3508&amp;oldid=prev</id>
		<title>JamesMorris: New page: == Title ==  Extending the Linux Integrity Subsystem for TCB Protection  == Presenter ==  David Safford &amp; Mimi Zohar, IBM  == Abstract ==   The Linux Integrity Subsystem currently provides...</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Safford&amp;diff=3508&amp;oldid=prev"/>
		<updated>2014-07-15T16:19:40Z</updated>

		<summary type="html">&lt;p&gt;New page: == Title ==  Extending the Linux Integrity Subsystem for TCB Protection  == Presenter ==  David Safford &amp;amp; Mimi Zohar, IBM  == Abstract ==   The Linux Integrity Subsystem currently provides...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Title ==&lt;br /&gt;
&lt;br /&gt;
Extending the Linux Integrity Subsystem for TCB Protection&lt;br /&gt;
&lt;br /&gt;
== Presenter ==&lt;br /&gt;
&lt;br /&gt;
David Safford &amp;amp; Mimi Zohar, IBM&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Linux Integrity Subsystem currently provides basic file integrity &lt;br /&gt;
measurement, attestation, and appraisal, combining both the trusted &lt;br /&gt;
computing model based on hashes, and the secure computing model based &lt;br /&gt;
on signatures.  It has, however, limitations in its ability to protect&lt;br /&gt;
all TCB files. For example, the appraisal policy cannot distinguish&lt;br /&gt;
TCB regular files which are read and executed by an interpreter from &lt;br /&gt;
files which are simply read. In addition, while IMA-appraisal-digsig &lt;br /&gt;
provides some immutability for signed files, a root privileged attacker&lt;br /&gt;
can (in some cases) simply delete and replace the file with an unsigned &lt;br /&gt;
one. To overcome these limitations, we have extended IMA with a policy &lt;br /&gt;
based locking that integrates a concept similar to BSD immutable files&lt;br /&gt;
with the full power of the IMA policy language.&lt;br /&gt;
&lt;br /&gt;
The first part of the talk will describe the use of IMA audit data to &lt;br /&gt;
determine which files are in the Fedora 20 desktop TCB, and show how &lt;br /&gt;
the existing IMA is unable to distinguish and lock some of these files &lt;br /&gt;
adequately. We will then detail the new extensions, and show how these &lt;br /&gt;
extensions are able to protect the TCB. We will then demonstrate the &lt;br /&gt;
overall subsystem in action, including package installation and update.&lt;br /&gt;
&lt;br /&gt;
As a bonus, we will show how to build a complementary multifunction usb &lt;br /&gt;
hardware token for the truly paranoid. It combines the functionality of &lt;br /&gt;
a TPM (for anchoring IMA attestation on systems with no TPM), of a &lt;br /&gt;
signature authority (for signing all TCB files locally with _your_ key), &lt;br /&gt;
and an authentication token (for remote access like ssh). The RSA private &lt;br /&gt;
keys are generated on token, and never leave the token. &lt;br /&gt;
(Some soldering required :-)&lt;/div&gt;</summary>
		<author><name>JamesMorris</name></author>
	</entry>
</feed>