David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 1 | # SPDX-License-Identifier: GPL-2.0-only |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 2 | # |
| 3 | config INTEGRITY |
| 4 | bool "Integrity subsystem" |
| 5 | depends on SECURITY |
| 6 | default y |
| 7 | help |
| 8 | This option enables the integrity subsystem, which is comprised |
| 9 | of a number of different components including the Integrity |
| 10 | Measurement Architecture (IMA), Extended Verification Module |
| 11 | (EVM), IMA-appraisal extension, digital signature verification |
| 12 | extension and audit measurement log support. |
| 13 | |
| 14 | Each of these components can be enabled/disabled separately. |
| 15 | Refer to the individual components for additional details. |
| 16 | |
| 17 | if INTEGRITY |
| 18 | |
| 19 | config INTEGRITY_SIGNATURE |
| 20 | bool "Digital signature verification using multiple keyrings" |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 21 | default n |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 22 | select KEYS |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 23 | select SIGNATURE |
| 24 | help |
| 25 | This option enables digital signature verification support |
| 26 | using multiple keyrings. It defines separate keyrings for each |
| 27 | of the different use cases - evm, ima, and modules. |
| 28 | Different keyrings improves search performance, but also allow |
| 29 | to "lock" certain keyring to prevent adding new keys. |
| 30 | This is useful for evm and module keyrings, when keys are |
| 31 | usually only added from initramfs. |
| 32 | |
| 33 | config INTEGRITY_ASYMMETRIC_KEYS |
| 34 | bool "Enable asymmetric keys support" |
| 35 | depends on INTEGRITY_SIGNATURE |
| 36 | default n |
| 37 | select ASYMMETRIC_KEY_TYPE |
| 38 | select ASYMMETRIC_PUBLIC_KEY_SUBTYPE |
| 39 | select CRYPTO_RSA |
| 40 | select X509_CERTIFICATE_PARSER |
| 41 | help |
| 42 | This option enables digital signature verification using |
| 43 | asymmetric keys. |
| 44 | |
| 45 | config INTEGRITY_TRUSTED_KEYRING |
| 46 | bool "Require all keys on the integrity keyrings be signed" |
| 47 | depends on SYSTEM_TRUSTED_KEYRING |
| 48 | depends on INTEGRITY_ASYMMETRIC_KEYS |
| 49 | default y |
| 50 | help |
| 51 | This option requires that all keys added to the .ima and |
| 52 | .evm keyrings be signed by a key on the system trusted |
| 53 | keyring. |
| 54 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 55 | config INTEGRITY_PLATFORM_KEYRING |
| 56 | bool "Provide keyring for platform/firmware trusted keys" |
| 57 | depends on INTEGRITY_ASYMMETRIC_KEYS |
| 58 | depends on SYSTEM_BLACKLIST_KEYRING |
| 59 | help |
| 60 | Provide a separate, distinct keyring for platform trusted keys, which |
| 61 | the kernel automatically populates during initialization from values |
| 62 | provided by the platform for verifying the kexec'ed kerned image |
| 63 | and, possibly, the initramfs signature. |
| 64 | |
| 65 | config LOAD_UEFI_KEYS |
| 66 | depends on INTEGRITY_PLATFORM_KEYRING |
| 67 | depends on EFI |
| 68 | def_bool y |
| 69 | |
| 70 | config LOAD_IPL_KEYS |
| 71 | depends on INTEGRITY_PLATFORM_KEYRING |
| 72 | depends on S390 |
| 73 | def_bool y |
| 74 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 75 | config INTEGRITY_AUDIT |
| 76 | bool "Enables integrity auditing support " |
| 77 | depends on AUDIT |
| 78 | default y |
| 79 | help |
| 80 | In addition to enabling integrity auditing support, this |
| 81 | option adds a kernel parameter 'integrity_audit', which |
| 82 | controls the level of integrity auditing messages. |
| 83 | 0 - basic integrity auditing messages (default) |
| 84 | 1 - additional integrity auditing messages |
| 85 | |
| 86 | Additional informational integrity auditing messages would |
| 87 | be enabled by specifying 'integrity_audit=1' on the kernel |
| 88 | command line. |
| 89 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 90 | source "security/integrity/ima/Kconfig" |
| 91 | source "security/integrity/evm/Kconfig" |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 92 | |
| 93 | endif # if INTEGRITY |