• Mimi Zohar's avatar
    ima: use IMA default hash algorithm for integrity violations · 09091c44
    Mimi Zohar authored
    Integrity file violations - ToM/ToU, open writers - are recorded in the IMA
    measurement list, containing 0x00's in both the template data and file data
    hash fields, but 0xFF's are actually extended into TPM PCRs.  Although the
    original 'ima' template data field ('d') is limited to 20 bytes, the 'd-ng'
    template digest field is not.
    
    The violation file data hash template field ('d-ng') is unnecessarily hard
    coded to SHA1.  Instead of simply replacing the hard coded SHA1 hash
    algorithm with a larger hash algorithm, use the hash algorithm as defined
    in "ima_hash_algo".  ima_hash_algo is set to either the Kconfig IMA default
    hash algorithm or as defined on the boot command line (ima_hash=).
    
    Including a non-SHA1 file data hash algorithm in the 'd-ng' field of
    violations is a cosmetic change.  The template data hash field, which is
    extended into the TPM PCRs, is not affected by this change and should not
    affect attestation of the IMA measurement list.
    Tested-by: default avatarStefan Berger <stefanb@linux.ibm.com>
    Signed-off-by: default avatarMimi Zohar <zohar@linux.ibm.com>
    09091c44
ima_template_lib.c 17.4 KB