Commit 02ee2316 authored by Mimi Zohar's avatar Mimi Zohar

fsverity: update the documentation

Update the fsverity documentation related to IMA signature support.
Acked-by: default avatarStefan Berger <stefanb@linux.ibm.com>
Acked-by: default avatarEric Biggers <ebiggers@google.com>
Signed-off-by: default avatarMimi Zohar <zohar@linux.ibm.com>
parent 398c42e2
...@@ -70,12 +70,23 @@ must live on a read-write filesystem because they are independently ...@@ -70,12 +70,23 @@ must live on a read-write filesystem because they are independently
updated and potentially user-installed, so dm-verity cannot be used. updated and potentially user-installed, so dm-verity cannot be used.
The base fs-verity feature is a hashing mechanism only; actually The base fs-verity feature is a hashing mechanism only; actually
authenticating the files is up to userspace. However, to meet some authenticating the files may be done by:
users' needs, fs-verity optionally supports a simple signature
verification mechanism where users can configure the kernel to require * Userspace-only
that all fs-verity files be signed by a key loaded into a keyring; see
`Built-in signature verification`_. Support for fs-verity file hashes * Builtin signature verification + userspace policy
in IMA (Integrity Measurement Architecture) policies is also planned.
fs-verity optionally supports a simple signature verification
mechanism where users can configure the kernel to require that
all fs-verity files be signed by a key loaded into a keyring;
see `Built-in signature verification`_.
* Integrity Measurement Architecture (IMA)
IMA supports including fs-verity file digests and signatures in the
IMA measurement list and verifying fs-verity based file signatures
stored as security.ima xattrs, based on policy.
User API User API
======== ========
...@@ -653,12 +664,12 @@ weren't already directly answered in other parts of this document. ...@@ -653,12 +664,12 @@ weren't already directly answered in other parts of this document.
hashed and what to do with those hashes, such as log them, hashed and what to do with those hashes, such as log them,
authenticate them, or add them to a measurement list. authenticate them, or add them to a measurement list.
IMA is planned to support the fs-verity hashing mechanism as an IMA supports the fs-verity hashing mechanism as an alternative
alternative to doing full file hashes, for people who want the to full file hashes, for those who want the performance and
performance and security benefits of the Merkle tree based hash. security benefits of the Merkle tree based hash. However, it
But it doesn't make sense to force all uses of fs-verity to be doesn't make sense to force all uses of fs-verity to be through
through IMA. As a standalone filesystem feature, fs-verity IMA. fs-verity already meets many users' needs even as a
already meets many users' needs, and it's testable like other standalone filesystem feature, and it's testable like other
filesystem features e.g. with xfstests. filesystem features e.g. with xfstests.
:Q: Isn't fs-verity useless because the attacker can just modify the :Q: Isn't fs-verity useless because the attacker can just modify the
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment