Go to file
Alberto Planas Dominguez eed6549f29 Accepting request 1180841 from home:aplanas:branches:security
- Update to version 0.2.6~0:
  * Bump version to 0.2.6
  * build(deps): bump libc from 0.2.153 to 0.2.155
  * build(deps): bump serde from 1.0.196 to 1.0.203
  * rpm/fedora: Update rust macro usage
  * config: Support hostnames in registrar_ip option
  * added use of persisted IAK and IDevID and authorisation values
  * config changes
  * Adding /agent/info API to agent
  * Fix leftover 'unnecessary qualification' warnings on tests

OBS-URL: https://build.opensuse.org/request/show/1180841
OBS-URL: https://build.opensuse.org/package/show/security/rust-keylime?expand=0&rev=72
2024-06-14 08:03:14 +00:00
_constraints Accepting request 1058991 from home:aplanas:branches:security 2023-01-17 15:00:07 +00:00
_service Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00
_servicedata Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00
.gitattributes Accepting request 890792 from home:aplanas:keylime 2021-05-06 15:06:32 +00:00
.gitignore Accepting request 890792 from home:aplanas:keylime 2021-05-06 15:06:32 +00:00
cargo_config Accepting request 956709 from home:aplanas:branches:security 2022-02-22 13:05:07 +00:00
ima-policy Accepting request 1072170 from home:aplanas:branches:security 2023-03-15 16:47:53 +00:00
ima-policy.service Accepting request 1091251 from home:aplanas:branches:security 2023-06-07 10:22:53 +00:00
keylime-agent.conf.diff Accepting request 1142969 from home:aplanas:branches:security 2024-01-31 10:21:27 +00:00
keylime-user.conf Accepting request 989445 from home:aplanas:branches:security 2022-07-15 13:19:45 +00:00
keylime.xml Accepting request 1006459 from home:aplanas:branches:security 2022-09-27 15:47:30 +00:00
README.suse Accepting request 1072170 from home:aplanas:branches:security 2023-03-15 16:47:53 +00:00
rust-keylime-0.2.6~0.tar.zst Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00
rust-keylime.changes Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00
rust-keylime.obsinfo Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00
rust-keylime.spec Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00
tmpfiles.keylime Accepting request 989445 from home:aplanas:branches:security 2022-07-15 13:19:45 +00:00
vendor.tar.xz Accepting request 1180841 from home:aplanas:branches:security 2024-06-14 08:03:14 +00:00

# Notes about the IMA policy

This IMA policy is provided as an example that can be later adapted to
more specific usage.

This was generated from a default tcb IMA policy from a 6.1.12 Linux
kernel, and extended with SELinux file types to filter out the part of
the system that we usually do not want to measure.

To use this policy, we need to copy it in "/etc/ima/ima-policy" and
systemd will load it after the SELinux policy has been loaded.

For this example, we used the initial set of SELinux attributes, that
group the file types under categories.  From that list we selected
some of those attribute to deep more into the types that can be relevant for the IMA policy:

  seinfo -a

The current selection cover full or partially the types under those
attributes:

  base_file_type
  base_ro_file_type
  configfile
  file_type
  files_unconfined_type
  init_script_file_type
  init_sock_file_type
  lockfile
  logfile
  non_auth_file_type
  non_security_file_type
  openshift_file_type
  pidfile
  pulseaudio_tmpfsfile
  security_file_type
  setfiles_domain
  spoolfile
  svirt_file_type
  systemd_unit_file_type
  tmpfile
  tmpfsfile

Special mention to non_auth_file_type and non_security_file_type
(among other liske logfile or tmpfile), that should cover the most
relevant types of the dynamic part of the system.

The list should also include types from other attributes like
virt_image_type and others (see the policy file comments from a
complete list).

Sometimes is important to see what files are labeled under a specific
type, and for that we can use this:

  semanage fcontext -l | grep $TYPE