Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760221AbZA3AIu (ORCPT ); Thu, 29 Jan 2009 19:08:50 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1758418AbZA3AIT (ORCPT ); Thu, 29 Jan 2009 19:08:19 -0500 Received: from tundra.namei.org ([65.99.196.166]:1374 "EHLO tundra.namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757921AbZA3AIS (ORCPT ); Thu, 29 Jan 2009 19:08:18 -0500 Date: Fri, 30 Jan 2009 11:07:03 +1100 (EST) From: James Morris To: Mimi Zohar cc: linux-kernel@vger.kernel.org, Andrew Morton , Christoph Hellwig , Dave Hansen , ", Serge Hallyn , Mimi Zohar Subject: Re: [PATCH 2/6] integrity: IMA as an integrity service provider In-Reply-To: Message-ID: References: User-Agent: Alpine 1.10 (LRH 962 2008-03-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1438 Lines: 45 On Thu, 29 Jan 2009, Mimi Zohar wrote: > +++ b/security/integrity/ima/Kconfig > @@ -0,0 +1,49 @@ > +# IBM Integrity Measurement Architecture > +# > +config IMA > + bool "Integrity Measurement Architecture(IMA)" > + depends on ACPI > + select SECURITYFS > + select CRYPTO > + select CRYPTO_HMAC > + select CRYPTO_MD5 > + select CRYPTO_SHA1 > + select TCG_TPM > + select TCG_TIS > + help > + The Trusted Computing Group(TCG) runtime Integrity > + Measurement Architecture(IMA) maintains a list of hash > + values of executables and other sensitive system files, > + as they are read or executed. If an attacker manages > + to change the contents of an important system file > + being measured, we can tell. Out of interest, do you know if the TCG has analyzed their use of SHA-1 in light of various attacks on the algorithm over the last few years? The IETF has published analysis and recommendations relating to the use of SHA-1 (and other cryptographic hashes) with IP protocols: http://www.ietf.org/rfc/rfc4894.txt http://www.ietf.org/rfc/rfc4270.txt It would be useful to know if similar analysis has been performed for TPM. - James -- James Morris -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/