summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArmin Kuster <akuster808@gmail.com>2019-05-25 23:12:35 -0700
committerArmin Kuster <akuster808@gmail.com>2019-05-28 07:38:52 -0700
commitd1d4e78708d955d3779fb8ae7c3a531bbfb55050 (patch)
tree91b58d3200d46ba464eff53217568be838598c64
parentcf0123e130696048feb8ddb1b21b214d222bf582 (diff)
downloadmeta-security-d1d4e78708d955d3779fb8ae7c3a531bbfb55050.tar.gz
data: remove policies
Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-integrity/data/ima_policy_appraise_all29
-rw-r--r--meta-integrity/data/ima_policy_hashed77
-rw-r--r--meta-integrity/data/ima_policy_simple4
3 files changed, 0 insertions, 110 deletions
diff --git a/meta-integrity/data/ima_policy_appraise_all b/meta-integrity/data/ima_policy_appraise_all
deleted file mode 100644
index 36e71a7..0000000
--- a/meta-integrity/data/ima_policy_appraise_all
+++ /dev/null
@@ -1,29 +0,0 @@
1#
2# Integrity measure policy (http://sourceforge.net/p/linux-ima/wiki/Home/#measure-nothing-appraise-everything)
3#
4# Do not measure anything, but appraise everything
5#
6# PROC_SUPER_MAGIC
7dont_appraise fsmagic=0x9fa0
8# SYSFS_MAGIC
9dont_appraise fsmagic=0x62656572
10# DEBUGFS_MAGIC
11dont_appraise fsmagic=0x64626720
12# TMPFS_MAGIC
13dont_appraise fsmagic=0x01021994
14# RAMFS_MAGIC
15dont_appraise fsmagic=0x858458f6
16# DEVPTS_SUPER_MAGIC
17dont_appraise fsmagic=0x1cd1
18# BIFMT
19dont_appraise fsmagic=0x42494e4d
20# SECURITYFS_MAGIC
21dont_appraise fsmagic=0x73636673
22# SELINUXFS_MAGIC
23dont_appraise fsmagic=0xf97cff8c
24# NSFS_MAGIC (introduced in 3.19, see cd025f7 and e149ed2 in the upstream Linux kernel)
25dont_appraise fsmagic=0x6e736673
26# EFIVARFS_MAGIC
27dont_appraise fsmagic=0xde5e81e4
28
29appraise
diff --git a/meta-integrity/data/ima_policy_hashed b/meta-integrity/data/ima_policy_hashed
deleted file mode 100644
index 7f89c8d..0000000
--- a/meta-integrity/data/ima_policy_hashed
+++ /dev/null
@@ -1,77 +0,0 @@
1# With this policy, all files on regular partitions are
2# appraised. Files with signed IMA hash and normal hash are
3# accepted. Signed files cannot be modified while hashed files can be
4# (which will also update the hash). However, signed files can
5# be deleted, so in practice it is still possible to replace them
6# with a modified version.
7#
8# Without EVM, this is obviously not very secure, so this policy is
9# just an example and/or basis for further improvements. For that
10# purpose, some comments show what could be added to make the policy
11# more secure.
12#
13# With EVM the situation might be different because access
14# to the EVM key can be restricted.
15#
16# Files which are appraised are also measured. This allows
17# debugging whether a file is in policy by looking at
18# /sys/kernel/security/ima/ascii_runtime_measurements
19
20# PROC_SUPER_MAGIC
21dont_appraise fsmagic=0x9fa0
22dont_measure fsmagic=0x9fa0
23# SYSFS_MAGIC
24dont_appraise fsmagic=0x62656572
25dont_measure fsmagic=0x62656572
26# DEBUGFS_MAGIC
27dont_appraise fsmagic=0x64626720
28dont_measure fsmagic=0x64626720
29# TMPFS_MAGIC
30dont_appraise fsmagic=0x01021994
31dont_measure fsmagic=0x01021994
32# RAMFS_MAGIC
33dont_appraise fsmagic=0x858458f6
34dont_measure fsmagic=0x858458f6
35# DEVPTS_SUPER_MAGIC
36dont_appraise fsmagic=0x1cd1
37dont_measure fsmagic=0x1cd1
38# BIFMT
39dont_appraise fsmagic=0x42494e4d
40dont_measure fsmagic=0x42494e4d
41# SECURITYFS_MAGIC
42dont_appraise fsmagic=0x73636673
43dont_measure fsmagic=0x73636673
44# SELINUXFS_MAGIC
45dont_appraise fsmagic=0xf97cff8c
46dont_measure fsmagic=0xf97cff8c
47# NSFS_MAGIC (introduced in 3.19, see cd025f7 and e149ed2 in the upstream Linux kernel)
48dont_appraise fsmagic=0x6e736673
49dont_measure fsmagic=0x6e736673
50# SMACK_MAGIC
51dont_appraise fsmagic=0x43415d53
52dont_measure fsmagic=0x43415d53
53# CGROUP_SUPER_MAGIC
54dont_appraise fsmagic=0x27e0eb
55dont_measure fsmagic=0x27e0eb
56# EFIVARFS_MAGIC
57dont_appraise fsmagic=0xde5e81e4
58dont_measure fsmagic=0xde5e81e4
59
60# Special partition, no checking done.
61# dont_measure fsuuid=a11234...
62# dont_appraise fsuuid=a11243...
63
64# Special immutable group.
65# appraise appraise_type=imasig func=FILE_CHECK mask=MAY_READ fgroup=200
66
67# All executables must be signed - too strict, we need to
68# allow installing executables on the device.
69# appraise appraise_type=imasig func=FILE_MMAP mask=MAY_EXEC
70# appraise appraise_type=imasig func=BPRM_CHECK mask=MAY_EXEC
71
72# Default rule. Would be needed also when other rules were added that
73# determine what to do in case of reading (mask=MAY_READ or
74# mask=MAY_EXEC) because otherwise writing does not update the file
75# hash.
76appraise
77measure
diff --git a/meta-integrity/data/ima_policy_simple b/meta-integrity/data/ima_policy_simple
deleted file mode 100644
index 38ca8f5..0000000
--- a/meta-integrity/data/ima_policy_simple
+++ /dev/null
@@ -1,4 +0,0 @@
1# Very simple policy demonstrating the systemd policy loading bug
2# (policy with one line works, two lines don't).
3dont_appraise fsmagic=0x9fa0
4dont_appraise fsmagic=0x62656572