Re: [PATCH 1/2] ima: define ima_trusted_for hook

From: Mimi Zohar
Date: Wed Oct 13 2021 - 10:35:21 EST


On Wed, 2021-10-13 at 07:01 -0400, Mimi Zohar wrote:
> A major interpreter integrity gap exists which allows files read by
> the interpreter to be executed without measuring the file or verifying
> the file's signature.
>
> The kernel has no knowledge about the file being read by the interpreter.
> Only the interpreter knows the context(eg. data, execute) and must be
> trusted to provide that information accurately.
>
> To close this integrity gap, define an ima_trusted_for hook to allow
> IMA to measure the file and verify the file's signature based on policy.
>
> Sample policy rules:
> measure func=TRUSTED_FOR_CHECK
> appraise func=TRUSTED_FOR_CHECK

To require file signatures, the policy rule should be:
appraise func=TRUSTED_FOR_CHECK appraise_type=imasig
>
> Signed-off-by: Mimi Zohar <zohar@xxxxxxxxxxxxx>