Kconfig (5087fd9e80e539d2163accd045b73da64de7de95) Kconfig (90f6f691a706754e33d2d0c6fa2e1dacedb477f6)
1# SPDX-License-Identifier: GPL-2.0-only
2# IBM Integrity Measurement Architecture
3#
4config IMA
5 bool "Integrity Measurement Architecture(IMA)"
6 select SECURITYFS
7 select CRYPTO
8 select CRYPTO_HMAC

--- 234 unchanged lines hidden (view full) ---

243 select MODULE_SIG_FORMAT
244 default n
245 help
246 Adds support for signatures appended to files. The format of the
247 appended signature is the same used for signed kernel modules.
248 The modsig keyword can be used in the IMA policy to allow a hook
249 to accept such signatures.
250
1# SPDX-License-Identifier: GPL-2.0-only
2# IBM Integrity Measurement Architecture
3#
4config IMA
5 bool "Integrity Measurement Architecture(IMA)"
6 select SECURITYFS
7 select CRYPTO
8 select CRYPTO_HMAC

--- 234 unchanged lines hidden (view full) ---

243 select MODULE_SIG_FORMAT
244 default n
245 help
246 Adds support for signatures appended to files. The format of the
247 appended signature is the same used for signed kernel modules.
248 The modsig keyword can be used in the IMA policy to allow a hook
249 to accept such signatures.
250
251config IMA_TRUSTED_KEYRING
252 bool "Require all keys on the .ima keyring be signed (deprecated)"
253 depends on IMA_APPRAISE && SYSTEM_TRUSTED_KEYRING
254 depends on INTEGRITY_ASYMMETRIC_KEYS
255 select INTEGRITY_TRUSTED_KEYRING
256 default y
257 help
258 This option requires that all keys added to the .ima
259 keyring be signed by a key on the system trusted keyring.
260
261 This option is deprecated in favor of INTEGRITY_TRUSTED_KEYRING
262
251config IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
252 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
253 depends on SYSTEM_TRUSTED_KEYRING
254 depends on SECONDARY_TRUSTED_KEYRING
255 depends on INTEGRITY_ASYMMETRIC_KEYS
256 select INTEGRITY_TRUSTED_KEYRING
257 default n
258 help
259 Keys may be added to the IMA or IMA blacklist keyrings, if the
260 key is validly signed by a CA cert in the system built-in or
263config IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
264 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
265 depends on SYSTEM_TRUSTED_KEYRING
266 depends on SECONDARY_TRUSTED_KEYRING
267 depends on INTEGRITY_ASYMMETRIC_KEYS
268 select INTEGRITY_TRUSTED_KEYRING
269 default n
270 help
271 Keys may be added to the IMA or IMA blacklist keyrings, if the
272 key is validly signed by a CA cert in the system built-in or
261 secondary trusted keyrings.
273 secondary trusted keyrings. The key must also have the
274 digitalSignature usage set.
262
263 Intermediate keys between those the kernel has compiled in and the
264 IMA keys to be added may be added to the system secondary keyring,
265 provided they are validly signed by a key already resident in the
266 built-in or secondary trusted keyrings.
267
268config IMA_BLACKLIST_KEYRING
269 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"

--- 59 unchanged lines hidden ---
275
276 Intermediate keys between those the kernel has compiled in and the
277 IMA keys to be added may be added to the system secondary keyring,
278 provided they are validly signed by a key already resident in the
279 built-in or secondary trusted keyrings.
280
281config IMA_BLACKLIST_KEYRING
282 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"

--- 59 unchanged lines hidden ---