Blame view

security/integrity/ima/Kconfig 1.67 KB
3323eec92   Mimi Zohar   integrity: IMA as...
1
2
3
4
  # IBM Integrity Measurement Architecture
  #
  config IMA
  	bool "Integrity Measurement Architecture(IMA)"
6c21a7fb4   Mimi Zohar   LSM: imbed ima ca...
5
  	depends on SECURITY
f381c2722   Mimi Zohar   integrity: move i...
6
  	select INTEGRITY
3323eec92   Mimi Zohar   integrity: IMA as...
7
8
9
10
11
  	select SECURITYFS
  	select CRYPTO
  	select CRYPTO_HMAC
  	select CRYPTO_MD5
  	select CRYPTO_SHA1
3369465ed   Al Viro   um: switch to use...
12
  	select TCG_TPM if !S390 && !UML
ba0c1709f   Mimi Zohar   ima: remove ACPI ...
13
  	select TCG_TIS if TCG_TPM
3323eec92   Mimi Zohar   integrity: IMA as...
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  	help
  	  The Trusted Computing Group(TCG) runtime Integrity
  	  Measurement Architecture(IMA) maintains a list of hash
  	  values of executables and other sensitive system files,
  	  as they are read or executed. If an attacker manages
  	  to change the contents of an important system file
  	  being measured, we can tell.
  
  	  If your system has a TPM chip, then IMA also maintains
  	  an aggregate integrity value over this list inside the
  	  TPM hardware, so that the TPM can prove to a third party
  	  whether or not critical system files have been modified.
  	  Read <http://www.usenix.org/events/sec04/tech/sailer.html>
  	  to learn more about IMA.
  	  If unsure, say N.
  
  config IMA_MEASURE_PCR_IDX
  	int
  	depends on IMA
  	range 8 14
  	default 10
  	help
  	  IMA_MEASURE_PCR_IDX determines the TPM PCR register index
  	  that IMA uses to maintain the integrity aggregate of the
  	  measurement list.  If unsure, use the default 10.
  
  config IMA_AUDIT
  	bool
  	depends on IMA
  	default y
  	help
  	  This option adds a kernel parameter 'ima_audit', which
  	  allows informational auditing messages to be enabled
  	  at boot.  If this option is selected, informational integrity
  	  auditing messages can be enabled with 'ima_audit=1' on
  	  the kernel command line.
4af4662fa   Mimi Zohar   integrity: IMA po...
50
51
  config IMA_LSM_RULES
  	bool
b53fab9d4   Randy Dunlap   ima: fix build error
52
  	depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
4af4662fa   Mimi Zohar   integrity: IMA po...
53
54
  	default y
  	help
b53fab9d4   Randy Dunlap   ima: fix build error
55
  	  Disabling this option will disregard LSM based policy rules.