summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLans Zhang <jia.zhang@windriver.com>2017-08-15 13:19:02 +0800
committerLans Zhang <jia.zhang@windriver.com>2017-08-15 14:13:23 +0800
commitc8fff6a0ff25dec955644e3f72045b05dd0f22bb (patch)
tree5babe43a3d2498c7b0e34fe76ea2bf1c01d37294
parentc912483e8789262bc3d1e7c0a43bbceeaa6facee (diff)
downloadmeta-secure-core-c8fff6a0ff25dec955644e3f72045b05dd0f22bb.tar.gz
meta-integrity/README.md: update
Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
-rw-r--r--meta-integrity/README.md29
1 files changed, 14 insertions, 15 deletions
diff --git a/meta-integrity/README.md b/meta-integrity/README.md
index 9525227..4d73c38 100644
--- a/meta-integrity/README.md
+++ b/meta-integrity/README.md
@@ -97,14 +97,16 @@ The custom external IMA policy file is eventually installed to `/etc/ima_policy`
97in initramfs. 97in initramfs.
98 98
99##### IMA certificate & private Key 99##### IMA certificate & private Key
100The private key come in two flavors; one used by an installer to sign all 100The private key come in two flavors; one used to sign all regular files in
101regular files in rootfs and one used by RPM to re-sign the executable, shared 101rootfs and one used by RPM to re-sign the executable, shared library, kernel
102library, kernel module and firmware during RPM installation. Correspondingly, 102module and firmware during RPM installation. Correspondingly, the IMA
103the IMA certificate is used to verify the IMA signature signed by the private 103certificate is used to verify the IMA signature signed by the private key.
104key.
105 104
106In addition, initramfs is a good place to import the IMA certificate likewise. 105In addition, initramfs is a good place to import the IMA certificate likewise.
107 106
107Note that the IMA certificate must be signed by the system trusted key by
108design. This guarantees the imported IMA certificate is always trustworthy.
109
108###### The default IMA certificate & private key 110###### The default IMA certificate & private key
109The default IMA certificate & private key are generated by the build system. By 111The default IMA certificate & private key are generated by the build system. By
110default, the sample keys are used for the purpose of development and 112default, the sample keys are used for the purpose of development and
@@ -150,25 +152,22 @@ The following best practices should be applied with using IMA.
150 152
151 To fix the failure, manually re-sign the affected file. 153 To fix the failure, manually re-sign the affected file.
152 154
153 Note: RPM installation violates the IMA appraisal but its post_install
154 operation will always re-sign the affected files.
155
156- Overwriting an existing file with the same content is deemed as tampering of 155- Overwriting an existing file with the same content is deemed as tampering of
157 the file. 156 the file.
158 157
159- The default IMA rules provides the ability of measuring the boot components 158- The default IMA rules provides the ability of measuring the boot components
160 and calculating the aggregate integrity value for attesting. However, this 159 and calculating the aggregate integrity value for attesting. However, this
161 function conflicts with encrypted-storage feature which employs PCR policy 160 function conflicts with encrypted-storage feature which employs PCR policy
162 session to retrieve the passphrase in a safe way. If the installer enables 161 session to retrieve the passphrase in a safe way. If both of them are
163 both of them, the default IMA rules will be not used. 162 enabled, the default IMA rules will be not used.
164 163
165### Reference 164### Reference
166[IMA wiki page](https://sourceforge.net/p/linux-ima/wiki/Home/) 165[Official IMA wiki page](https://sourceforge.net/p/linux-ima/wiki/Home/)
167 166
168[OpenEmbedded layer for EFI Secure Boot](https://github.com/jiazhang0/meta-efi-secure-boot) 167[OpenEmbedded layer for EFI Secure Boot](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-efi-secure-boot)
169 168
170[OpenEmbedded layer for signing key management](https://github.com/jiazhang0/meta-signing-key) 169[OpenEmbedded layer for signing key management](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-signing-key)
171 170
172[OpenEmbedded layer for TPM 1.x](https://github.com/jiazhang0/meta-tpm) 171[OpenEmbedded layer for TPM 1.x](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-tpm)
173 172
174[OpenEmbedded layer for TPM 2.0](https://github.com/jiazhang0/meta-tpm2) 173[OpenEmbedded layer for TPM 2.0](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-tpm2)