Home
last modified time | relevance | path

Searched hist:"56 dc986a" (Results 1 – 1 of 1) sorted by relevance

/openbmc/linux/security/integrity/ima/
H A Dima_efi.c56dc986a Tue Jul 25 21:08:05 CDT 2023 Coiby Xu <coxu@redhat.com> ima: require signed IMA policy when UEFI secure boot is enabled

With commit 099f26f22f58 ("integrity: machine keyring CA
configuration"), users are able to add custom IMA CA keys via
MOK. This allows users to sign their own IMA polices without
recompiling the kernel. For the sake of security, mandate signed IMA
policy when UEFI secure boot is enabled.

Note this change may affect existing users/tests i.e users won't be able
to load an unsigned IMA policy when the IMA architecture specific policy
is configured and UEFI secure boot is enabled.

Suggested-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Coiby Xu <coxu@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>