diff options
| author | Armin Kuster <akuster808@gmail.com> | 2019-05-25 23:12:35 -0700 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2019-05-26 21:58:11 -0700 |
| commit | 1bbd9d70f77e67a3a8204a542763b7310c9dd1cc (patch) | |
| tree | 91b58d3200d46ba464eff53217568be838598c64 | |
| parent | 17acb4ec73bce3aef39569b0d9f14f598ef3dd47 (diff) | |
| download | meta-security-1bbd9d70f77e67a3a8204a542763b7310c9dd1cc.tar.gz | |
data: remove policies
Signed-off-by: Armin Kuster <akuster808@gmail.com>
| -rw-r--r-- | meta-integrity/data/ima_policy_appraise_all | 29 | ||||
| -rw-r--r-- | meta-integrity/data/ima_policy_hashed | 77 | ||||
| -rw-r--r-- | meta-integrity/data/ima_policy_simple | 4 |
3 files changed, 0 insertions, 110 deletions
diff --git a/meta-integrity/data/ima_policy_appraise_all b/meta-integrity/data/ima_policy_appraise_all deleted file mode 100644 index 36e71a7..0000000 --- a/meta-integrity/data/ima_policy_appraise_all +++ /dev/null | |||
| @@ -1,29 +0,0 @@ | |||
| 1 | # | ||
| 2 | # Integrity measure policy (http://sourceforge.net/p/linux-ima/wiki/Home/#measure-nothing-appraise-everything) | ||
| 3 | # | ||
| 4 | # Do not measure anything, but appraise everything | ||
| 5 | # | ||
| 6 | # PROC_SUPER_MAGIC | ||
| 7 | dont_appraise fsmagic=0x9fa0 | ||
| 8 | # SYSFS_MAGIC | ||
| 9 | dont_appraise fsmagic=0x62656572 | ||
| 10 | # DEBUGFS_MAGIC | ||
| 11 | dont_appraise fsmagic=0x64626720 | ||
| 12 | # TMPFS_MAGIC | ||
| 13 | dont_appraise fsmagic=0x01021994 | ||
| 14 | # RAMFS_MAGIC | ||
| 15 | dont_appraise fsmagic=0x858458f6 | ||
| 16 | # DEVPTS_SUPER_MAGIC | ||
| 17 | dont_appraise fsmagic=0x1cd1 | ||
| 18 | # BIFMT | ||
| 19 | dont_appraise fsmagic=0x42494e4d | ||
| 20 | # SECURITYFS_MAGIC | ||
| 21 | dont_appraise fsmagic=0x73636673 | ||
| 22 | # SELINUXFS_MAGIC | ||
| 23 | dont_appraise fsmagic=0xf97cff8c | ||
| 24 | # NSFS_MAGIC (introduced in 3.19, see cd025f7 and e149ed2 in the upstream Linux kernel) | ||
| 25 | dont_appraise fsmagic=0x6e736673 | ||
| 26 | # EFIVARFS_MAGIC | ||
| 27 | dont_appraise fsmagic=0xde5e81e4 | ||
| 28 | |||
| 29 | appraise | ||
diff --git a/meta-integrity/data/ima_policy_hashed b/meta-integrity/data/ima_policy_hashed deleted file mode 100644 index 7f89c8d..0000000 --- a/meta-integrity/data/ima_policy_hashed +++ /dev/null | |||
| @@ -1,77 +0,0 @@ | |||
| 1 | # With this policy, all files on regular partitions are | ||
| 2 | # appraised. Files with signed IMA hash and normal hash are | ||
| 3 | # accepted. Signed files cannot be modified while hashed files can be | ||
| 4 | # (which will also update the hash). However, signed files can | ||
| 5 | # be deleted, so in practice it is still possible to replace them | ||
| 6 | # with a modified version. | ||
| 7 | # | ||
| 8 | # Without EVM, this is obviously not very secure, so this policy is | ||
| 9 | # just an example and/or basis for further improvements. For that | ||
| 10 | # purpose, some comments show what could be added to make the policy | ||
| 11 | # more secure. | ||
| 12 | # | ||
| 13 | # With EVM the situation might be different because access | ||
| 14 | # to the EVM key can be restricted. | ||
| 15 | # | ||
| 16 | # Files which are appraised are also measured. This allows | ||
| 17 | # debugging whether a file is in policy by looking at | ||
| 18 | # /sys/kernel/security/ima/ascii_runtime_measurements | ||
| 19 | |||
| 20 | # PROC_SUPER_MAGIC | ||
| 21 | dont_appraise fsmagic=0x9fa0 | ||
| 22 | dont_measure fsmagic=0x9fa0 | ||
| 23 | # SYSFS_MAGIC | ||
| 24 | dont_appraise fsmagic=0x62656572 | ||
| 25 | dont_measure fsmagic=0x62656572 | ||
| 26 | # DEBUGFS_MAGIC | ||
| 27 | dont_appraise fsmagic=0x64626720 | ||
| 28 | dont_measure fsmagic=0x64626720 | ||
| 29 | # TMPFS_MAGIC | ||
| 30 | dont_appraise fsmagic=0x01021994 | ||
| 31 | dont_measure fsmagic=0x01021994 | ||
| 32 | # RAMFS_MAGIC | ||
| 33 | dont_appraise fsmagic=0x858458f6 | ||
| 34 | dont_measure fsmagic=0x858458f6 | ||
| 35 | # DEVPTS_SUPER_MAGIC | ||
| 36 | dont_appraise fsmagic=0x1cd1 | ||
| 37 | dont_measure fsmagic=0x1cd1 | ||
| 38 | # BIFMT | ||
| 39 | dont_appraise fsmagic=0x42494e4d | ||
| 40 | dont_measure fsmagic=0x42494e4d | ||
| 41 | # SECURITYFS_MAGIC | ||
| 42 | dont_appraise fsmagic=0x73636673 | ||
| 43 | dont_measure fsmagic=0x73636673 | ||
| 44 | # SELINUXFS_MAGIC | ||
| 45 | dont_appraise fsmagic=0xf97cff8c | ||
| 46 | dont_measure fsmagic=0xf97cff8c | ||
| 47 | # NSFS_MAGIC (introduced in 3.19, see cd025f7 and e149ed2 in the upstream Linux kernel) | ||
| 48 | dont_appraise fsmagic=0x6e736673 | ||
| 49 | dont_measure fsmagic=0x6e736673 | ||
| 50 | # SMACK_MAGIC | ||
| 51 | dont_appraise fsmagic=0x43415d53 | ||
| 52 | dont_measure fsmagic=0x43415d53 | ||
| 53 | # CGROUP_SUPER_MAGIC | ||
| 54 | dont_appraise fsmagic=0x27e0eb | ||
| 55 | dont_measure fsmagic=0x27e0eb | ||
| 56 | # EFIVARFS_MAGIC | ||
| 57 | dont_appraise fsmagic=0xde5e81e4 | ||
| 58 | dont_measure fsmagic=0xde5e81e4 | ||
| 59 | |||
| 60 | # Special partition, no checking done. | ||
| 61 | # dont_measure fsuuid=a11234... | ||
| 62 | # dont_appraise fsuuid=a11243... | ||
| 63 | |||
| 64 | # Special immutable group. | ||
| 65 | # appraise appraise_type=imasig func=FILE_CHECK mask=MAY_READ fgroup=200 | ||
| 66 | |||
| 67 | # All executables must be signed - too strict, we need to | ||
| 68 | # allow installing executables on the device. | ||
| 69 | # appraise appraise_type=imasig func=FILE_MMAP mask=MAY_EXEC | ||
| 70 | # appraise appraise_type=imasig func=BPRM_CHECK mask=MAY_EXEC | ||
| 71 | |||
| 72 | # Default rule. Would be needed also when other rules were added that | ||
| 73 | # determine what to do in case of reading (mask=MAY_READ or | ||
| 74 | # mask=MAY_EXEC) because otherwise writing does not update the file | ||
| 75 | # hash. | ||
| 76 | appraise | ||
| 77 | measure | ||
diff --git a/meta-integrity/data/ima_policy_simple b/meta-integrity/data/ima_policy_simple deleted file mode 100644 index 38ca8f5..0000000 --- a/meta-integrity/data/ima_policy_simple +++ /dev/null | |||
| @@ -1,4 +0,0 @@ | |||
| 1 | # Very simple policy demonstrating the systemd policy loading bug | ||
| 2 | # (policy with one line works, two lines don't). | ||
| 3 | dont_appraise fsmagic=0x9fa0 | ||
| 4 | dont_appraise fsmagic=0x62656572 | ||
