On Fri, 2014-04-11 at 10:07 -0400, Steve Grubb wrote:
Hi Mimi,
On Thursday, April 10, 2014 11:36:15 PM Mimi Zohar wrote:
> On Wed, 2014-04-09 at 18:26 -0700, Peter Moody wrote:
> > On Wed, Apr 09 2014 at 10:19, Steve Grubb wrote:
> > > Missing INTEGRITY_RULE
> >
> > IMA with an 'audit' rule generates INTEGRITY_RULE messages.
For those of us not really up on IMA and just want to generate the event to
add to our collection, any tips on doing this?
Requires CONFIG_INTEGRITY_AUDIT=y to be configured and loading an IMA
policy* containing an audit rule (eg. audit func=BPRM_CHECK
mask=MAY_EXEC).
*Directions below for loading a policy.
> > Missing INTEGRITY_DATA
>
> Failure to collect or appraise file data.
> (Requires the filesystem to be labeled w/security.ima and integrity
> appraisal enabled.)
How would I cause this event to be generated if I wanted to see it?
Requires both CONFIG_IMA=y and CONFIG_IMA_APPRAISE=y to be enabled and
loading an IMA policy containing a measurement/appraisal rule (eg.
measure func=BPRM_CHECK, measure func=FILE_CHECK mask=MAY_READ uid=0,
audit func=BPRM_CHECK mask=MAY_EXEC). Both the boot command line
options 'ima_tcb' and 'ima_appraise_tcb' have these rules. Unlabeled
filesystems would require the additional boot command line option
'ima_appraise=fix'.
> > Missing INTEGRITY_HASH
>
> Not used.
OK, I'll mark that deprecated.
> > Missing INTEGRITY_METADATA
>
> Before updating/removing 'security.evm' the xattr or modifying file
> metadata included in the HMAC calculation(eg. i_ino, i_uid, i_gid,
> i_mode, FSUUID, i_generation), EVM verifies the existing value.
> (Requires the filesystem to be labeled w/security.evm and integrity
> appraisal enabled.)
How to get it?
In addition to the IMA/IMA-appraisal config options, requires
CONFIG_EVM=y. Assuming you've created an EVM key and loaded it, EVM is
enabled. (dracut has an EVM module.) Unlabeled filesystems would
require the additional boot command line option 'ima_evm=fix'.
> > Missing INTEGRITY_STATUS
>
> Errors related to the IMA policy.
How to get it?
Directions for loading a policy: to load a policy or replace the boot
command line 'ima_tcb'/'ima_appraisal_tcb' policies, cat the new policy
to /sys/kernel/security/ima/config. The IMA LTP testsuite has examples.
Mimi