IMA/EVM support utilities
Resolves: https://issues.redhat.com/browse/RHEL-100320 Upstream: Fedora Conflict: None Some IMA signatures from the RPM database may fail the verification because they can be changed. For examples, the following files on F41 can't pass IMA signature verification, /usr/lib64/gconv/gconv-modules.cache /boot/grub2/grubenv /var/lib/selinux/targeted/active/commit_num /var/lib/selinux/targeted/active/file_contexts /etc/ssh/sshd_config /etc/yum.repos.d/fedora-updates.repo /etc/yum.repos.d/fedora.repo /etc/group /etc/gshadow The kernel ima=fix mode won't generate IMA hash reference value for files with IMA signature. As a result, users can be denied the access to some files. So remove security.ima if a file fail the verification. |
||
|---|---|---|
| tests | ||
| .gitignore | ||
| centosimarelease-10.der | ||
| dracut-98-integrity.conf | ||
| gating.yaml | ||
| ima-add-sigs.sh | ||
| ima-evm-utils.spec | ||
| ima-setup.sh | ||
| policy_list | ||
| policy-01-appraise-executable-and-lib-signatures | ||
| policy-02-keylime-remote-attestation | ||
| redhatimarelease-10.der | ||
| sources | ||