Kconfig 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556
  1. # IBM Integrity Measurement Architecture
  2. #
  3. config IMA
  4. bool "Integrity Measurement Architecture(IMA)"
  5. depends on SECURITY
  6. select SECURITYFS
  7. select CRYPTO
  8. select CRYPTO_HMAC
  9. select CRYPTO_MD5
  10. select CRYPTO_SHA1
  11. select TCG_TPM if !S390
  12. select TCG_TIS if TCG_TPM
  13. help
  14. The Trusted Computing Group(TCG) runtime Integrity
  15. Measurement Architecture(IMA) maintains a list of hash
  16. values of executables and other sensitive system files,
  17. as they are read or executed. If an attacker manages
  18. to change the contents of an important system file
  19. being measured, we can tell.
  20. If your system has a TPM chip, then IMA also maintains
  21. an aggregate integrity value over this list inside the
  22. TPM hardware, so that the TPM can prove to a third party
  23. whether or not critical system files have been modified.
  24. Read <http://www.usenix.org/events/sec04/tech/sailer.html>
  25. to learn more about IMA.
  26. If unsure, say N.
  27. config IMA_MEASURE_PCR_IDX
  28. int
  29. depends on IMA
  30. range 8 14
  31. default 10
  32. help
  33. IMA_MEASURE_PCR_IDX determines the TPM PCR register index
  34. that IMA uses to maintain the integrity aggregate of the
  35. measurement list. If unsure, use the default 10.
  36. config IMA_AUDIT
  37. bool
  38. depends on IMA
  39. default y
  40. help
  41. This option adds a kernel parameter 'ima_audit', which
  42. allows informational auditing messages to be enabled
  43. at boot. If this option is selected, informational integrity
  44. auditing messages can be enabled with 'ima_audit=1' on
  45. the kernel command line.
  46. config IMA_LSM_RULES
  47. bool
  48. depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
  49. default y
  50. help
  51. Disabling this option will disregard LSM based policy rules.