From: Vivek Goyal Subject: Re: [RFC 1/1] ima: digital signature verification using asymmetric keys Date: Tue, 29 Jan 2013 13:20:12 -0500 Message-ID: <20130129182012.GA21002@redhat.com> References: <1358895228.2408.14.camel@falcor1> <20130125210157.GA13152@redhat.com> <20130128151527.GA5868@redhat.com> <20130128185625.GC5868@redhat.com> <1359404149.3906.75.camel@falcor1> <20130128202241.GB14405@redhat.com> <1359424135.3906.247.camel@falcor1> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: "Kasatkin, Dmitry" , dhowells@redhat.com, jmorris@namei.org, linux-security-module@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org To: Mimi Zohar Return-path: Received: from mx1.redhat.com ([209.132.183.28]:38298 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751143Ab3A2SUb (ORCPT ); Tue, 29 Jan 2013 13:20:31 -0500 Content-Disposition: inline In-Reply-To: <1359424135.3906.247.camel@falcor1> Sender: linux-crypto-owner@vger.kernel.org List-ID: On Mon, Jan 28, 2013 at 08:48:55PM -0500, Mimi Zohar wrote: [..] > > Hi Mimi, > > > > By policy you mean ima rules here? So I can either enable default rules > > (tcb default rules for appraisal and measurement) by using kernel command > > line options or dynamically configure my own rules using /sysfs interface? > > > > If yes, AFAIK, existing inputtable policies do not allow this selective > > mode where we do appraisal only on signed executable. That means I shall > > have to extend the way policies can be specified so that one specify > > that appraise only signed files? > > We've just added the ability of defining the method for appraising a > file and defining rules in terms of the filesystem UUID. Extending the > IMA policy shouldn't be a problem, but I'm not sure how you would go > about adding support for only appraising files with digital signatures. Hi Mimi, Can we add another field to ima_rule_entry, say .enforcement to control the behavior of .action. Possible values of .enforcement could be, say. ALL SIGNED_ONLY ALL will be default. And with .action= MEASURE, one could possibly use .enforcement=SIGNED_ONLY. Thanks Vivek