/meta-integrity

Primary LanguageBitBakeMIT LicenseMIT

meta-integrity

OpenEmbedded layer for Linux integrity support

Integrity Measurement Architecture (IMA)
========================================

The Linux IMA subsystem introduces hooks within the Linux kernel to support
measuring the integrity of files that are loaded (including application code)
before it is executed or mmap()ed to memory. The measured value (hash) is then
registered in a log that can be consulted by administrators.

To support proven integrity of the files, the IMA subsystem can interact with
the TPM chip within the system to protect the registered hashes from tampering
by a rogue administrator or application. The IMA subsystem, as already
supported by the Linux kernel, supports reporting on the hashes of files and
commands ran by privileged accounts (and more if you create your own
measurement policies).

In addition, IMA appraisal can even register the measured value as an extended
attribute, and after subsequent measurement(s) validate this extended attribute
against the measured value and refuse to load the file (or execute the
application) if the hash does not match. In that case, the IMA subsystem allows
files and applications to be loaded if the hashes match (and will save the
updated hash if the file is modified) but refuse to load it if it doesn't. This
provides some protection against offline tampering of the files.

NOTE: Extended file system attribute is required for IMA appraisal, but not
all file systems can support it. Typically, the pseudo file systems, such as
sysfs, proc, tmpfs and ramfs, certain disk-based file systems, such as FAT,
and network file systems, such as NFS, don't support extended attribute,
meaning IMA appraisal is not available with them.

Build
=====

In order to enable this feature, add the path to
feature/ima/template.conf to the init script.

Dependency
==========
- meta-ima
  This layer provides the user space recipes.

- meta-measured
  This layer provides the kernel configurations.

Use The External IMA Policy
===========================
initramfs is a good place to run some IMA initializations, such as loading
the IMA policy, as well as the public keys used to verify IMA signatures.

The default external IMA policy
-------------------------------
The default external IMA policy enforces appraising all the executable, shared
library, kernel modules and firmwares with the digital signature in the
effective root identity (euid=0). Hence, the opportunity of loading the default
external IMA policy occurs at the end of initramfs initializations, just before
switch_root.

Instead of running switch_root directly from initramfs, a statically linked
switch_root from the real rootfs is called and it must be already signed
properly. Otherwise, switch_root will fail to mount the real rootfs and kernel
panic will happen due to this failure.

The default external IMA policy is located at /etc/ima_policy.default in
initramfs. If a custom external IMA policy file exists, the default external
IMA policy file won't be used any more.

The default external IMA policy enables the following constraint conditions:
- Appraise the files for exec'd (the executables), files mmap'd for exec
  (shared libraries), kernel modules and firmwares in effective root identity
  (euid=0).
- Enforce verifying the IMA signature when running the executables, shared
  libraries, kernel modules and firmwares.
- Deny to run the newly created executables, shared libraries, kernel modules
  and firmwares.
- Deny to run the tampered executables, shared libraries, kernel modules and
  firmwares.
- Deny to run any executables, shared libraries, kernel modules and firmwares
  in the filesystems without file extended attribute supported.
- Allow to run the manually signed executables, shared libraries, kernel
  modules and firmwares.
- Allow to run the updated executables, shared libraries, kernel modules and
  firmwares during RPM installation.
- Note the different behaviors when executing a script.
  e.g, launching a python script with "./test.py" is allowed only when test.py
  is signed, and launching a python script with "python test.py" is always
  allowed as long as the python interpreter is signed.

The custom external IMA policy
------------------------------
If the default external IMA policy cannot meet the protection requirement, it
is allowed to define the custom external IMA policy.

- Deploy the custom policy file to installer image

- Create /opt/installer/sbin/config-installer.sh in installer image
  Define the IMA_POLICY variable, pointing to the path of policy file.

The custom external IMA policy file is eventually installed to /etc/ima_policy
in initramfs.

IMA Public & Private Key
========================

The private key come in two flavors; one used by the installer to sign all
regular files in rootfs and one used by RPM to re-sign the executable, shared
library, kernel module and firmware during RPM installation. Correspondingly,
the public key is used to verify the IMA signature signed by the private key.

They are installed to /etc/keys/pubkey_evm.pem and
/etc/keys/privkey_evm.pem correspondingly.

In addition, initramfs is a good place to import the IMA public key likewise.

The default IMA public & private key
------------------------------------
The default IMA public & private key are generated by the build system. By
default, the sample keys are used for the purpose of development and
demonstration. Please ensure you know what your risk is to use the sample keys
in your product, because they are completely public.

The custom IMA public & private key
-----------------------------------
If the end user wants to use the public & private key owned by self, it is
allowed to define the use them during the installation.

- Deploy the ima public key and private key to /opt/installer/files/

- Create /opt/installer/sbin/config-installer.sh in installer image
  Define the IMA_PUBKEY variable, pointing to the path of public key file.
  Define the IMA_PRIVKEY variable, pointing to the path of private key file.

Refer to README.user-key-store for the details about how to generate/use
the keys owned by the user.

Note:
- The private key specified by IMA_PRIVKEY variable is not installed for safety,
unless the user intends to copy it to rootfs.
- The sample private key is installed to rootfs if used.

Installer command line
======================
# cd /opt/installer/sbin
# ./cubeit-installer --ima-sign -b <options> <device>

where --ima-sign indicates the installer will label the filesystems with IMA
signing.

Best practice
=============
The following best practices should be applied with using IMA.

- Enable UEFI/MOK secure boot
  UEFI/MOK secure boot can verify the integrity of initramfs, providing the
  protection against tampering of the external IMA policy files and IMA public
  keys stored in initramfs.

- Moderate measuring
  Measuring the files owned by non-root user may introduce malicious attack.
  Malicious user may create lots of files with different names or trigger
  violation conditions to generate a mass of event logs recorded in the runtime
  measurement list, and thus exhaust the persistent kernel memory.

- Performance influence
  Moderate policy can make a good balance between the performance and security.
  Tune the default external policy (/etc/ima_policy.default) and modulate the
  custom policy for the product requirement.

- Use IMA digital signature to protect the executable
  Using the digital signature scheme DIGSIG is safer than digest-based scheme.
  Meanwhile, use "appraise_type=imasig" in your IMA policy to enforce running
  this.

- Use the measurement and audit rules together
  The runtime measurement list is unable to track down the order of changes for
  a file, e.g, a file content varies in order of X -> Y -> X. However, audit log
  can record these changes in the right order.

Known Issues
============
- The following operations may break the behavior of appraisal and cause the
  failure of launching the executables, shared libraries, kernel modules and
  firmwares:
  - the syscalls used to set file last access and modification times.
  - the syscalls used to set ownership of a file.
  - the syscalls used to set permissions of a file.

  To fix the failure, manually re-sign the affected file.

  Note: RPM installation violates the IMA appraisal but its post_install
  operation will always re-sign the affected files.

- Overwriting an existing file with the same content is deemed as tampering of
  the file.

- The default IMA rules provides the ability of measuring the boot components
  and calculating the aggregate integrity value for attesting. However, this
  function conflicts with storage-encryption feature which employs PCR policy
  session to retrieve the passphrase in a safe way. If the installer enables
  both of them, the default IMA rules will be not used.

Reference
=========
https://sourceforge.net/p/linux-ima/wiki/Home/
template/efi-secure-boot/README
template/mok-secure-boot/README