diff options
author | Lans Zhang <jia.zhang@windriver.com> | 2017-08-15 13:19:02 +0800 |
---|---|---|
committer | Lans Zhang <jia.zhang@windriver.com> | 2017-08-15 14:13:23 +0800 |
commit | c8fff6a0ff25dec955644e3f72045b05dd0f22bb (patch) | |
tree | 5babe43a3d2498c7b0e34fe76ea2bf1c01d37294 | |
parent | c912483e8789262bc3d1e7c0a43bbceeaa6facee (diff) | |
download | meta-secure-core-c8fff6a0ff25dec955644e3f72045b05dd0f22bb.tar.gz |
meta-integrity/README.md: update
Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
-rw-r--r-- | meta-integrity/README.md | 29 |
1 files changed, 14 insertions, 15 deletions
diff --git a/meta-integrity/README.md b/meta-integrity/README.md index 9525227..4d73c38 100644 --- a/meta-integrity/README.md +++ b/meta-integrity/README.md | |||
@@ -97,14 +97,16 @@ The custom external IMA policy file is eventually installed to `/etc/ima_policy` | |||
97 | in initramfs. | 97 | in initramfs. |
98 | 98 | ||
99 | ##### IMA certificate & private Key | 99 | ##### IMA certificate & private Key |
100 | The private key come in two flavors; one used by an installer to sign all | 100 | The private key come in two flavors; one used to sign all regular files in |
101 | regular files in rootfs and one used by RPM to re-sign the executable, shared | 101 | rootfs and one used by RPM to re-sign the executable, shared library, kernel |
102 | library, kernel module and firmware during RPM installation. Correspondingly, | 102 | module and firmware during RPM installation. Correspondingly, the IMA |
103 | the IMA certificate is used to verify the IMA signature signed by the private | 103 | certificate is used to verify the IMA signature signed by the private key. |
104 | key. | ||
105 | 104 | ||
106 | In addition, initramfs is a good place to import the IMA certificate likewise. | 105 | In addition, initramfs is a good place to import the IMA certificate likewise. |
107 | 106 | ||
107 | Note that the IMA certificate must be signed by the system trusted key by | ||
108 | design. This guarantees the imported IMA certificate is always trustworthy. | ||
109 | |||
108 | ###### The default IMA certificate & private key | 110 | ###### The default IMA certificate & private key |
109 | The default IMA certificate & private key are generated by the build system. By | 111 | The default IMA certificate & private key are generated by the build system. By |
110 | default, the sample keys are used for the purpose of development and | 112 | default, the sample keys are used for the purpose of development and |
@@ -150,25 +152,22 @@ The following best practices should be applied with using IMA. | |||
150 | 152 | ||
151 | To fix the failure, manually re-sign the affected file. | 153 | To fix the failure, manually re-sign the affected file. |
152 | 154 | ||
153 | Note: RPM installation violates the IMA appraisal but its post_install | ||
154 | operation will always re-sign the affected files. | ||
155 | |||
156 | - Overwriting an existing file with the same content is deemed as tampering of | 155 | - Overwriting an existing file with the same content is deemed as tampering of |
157 | the file. | 156 | the file. |
158 | 157 | ||
159 | - The default IMA rules provides the ability of measuring the boot components | 158 | - The default IMA rules provides the ability of measuring the boot components |
160 | and calculating the aggregate integrity value for attesting. However, this | 159 | and calculating the aggregate integrity value for attesting. However, this |
161 | function conflicts with encrypted-storage feature which employs PCR policy | 160 | function conflicts with encrypted-storage feature which employs PCR policy |
162 | session to retrieve the passphrase in a safe way. If the installer enables | 161 | session to retrieve the passphrase in a safe way. If both of them are |
163 | both of them, the default IMA rules will be not used. | 162 | enabled, the default IMA rules will be not used. |
164 | 163 | ||
165 | ### Reference | 164 | ### Reference |
166 | [IMA wiki page](https://sourceforge.net/p/linux-ima/wiki/Home/) | 165 | [Official IMA wiki page](https://sourceforge.net/p/linux-ima/wiki/Home/) |
167 | 166 | ||
168 | [OpenEmbedded layer for EFI Secure Boot](https://github.com/jiazhang0/meta-efi-secure-boot) | 167 | [OpenEmbedded layer for EFI Secure Boot](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-efi-secure-boot) |
169 | 168 | ||
170 | [OpenEmbedded layer for signing key management](https://github.com/jiazhang0/meta-signing-key) | 169 | [OpenEmbedded layer for signing key management](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-signing-key) |
171 | 170 | ||
172 | [OpenEmbedded layer for TPM 1.x](https://github.com/jiazhang0/meta-tpm) | 171 | [OpenEmbedded layer for TPM 1.x](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-tpm) |
173 | 172 | ||
174 | [OpenEmbedded layer for TPM 2.0](https://github.com/jiazhang0/meta-tpm2) | 173 | [OpenEmbedded layer for TPM 2.0](https://github.com/jiazhang0/meta-secure-core/tree/master/meta-tpm2) |