@@ -70,12 +70,23 @@ must live on a read-write filesystem because they are independently
7070updated and potentially user-installed, so dm-verity cannot be used.
7171
7272The base fs-verity feature is a hashing mechanism only; actually
73- authenticating the files is up to userspace. However, to meet some
74- users' needs, fs-verity optionally supports a simple signature
75- verification mechanism where users can configure the kernel to require
76- that all fs-verity files be signed by a key loaded into a keyring; see
77- `Built-in signature verification `_. Support for fs-verity file hashes
78- in IMA (Integrity Measurement Architecture) policies is also planned.
73+ authenticating the files may be done by:
74+
75+ * Userspace-only
76+
77+ * Builtin signature verification + userspace policy
78+
79+ fs-verity optionally supports a simple signature verification
80+ mechanism where users can configure the kernel to require that
81+ all fs-verity files be signed by a key loaded into a keyring;
82+ see `Built-in signature verification `_.
83+
84+ * Integrity Measurement Architecture (IMA)
85+
86+ IMA supports including fs-verity file digests and signatures in the
87+ IMA measurement list and verifying fs-verity based file signatures
88+ stored as security.ima xattrs, based on policy.
89+
7990
8091User API
8192========
@@ -653,12 +664,12 @@ weren't already directly answered in other parts of this document.
653664 hashed and what to do with those hashes, such as log them,
654665 authenticate them, or add them to a measurement list.
655666
656- IMA is planned to support the fs-verity hashing mechanism as an
657- alternative to doing full file hashes, for people who want the
658- performance and security benefits of the Merkle tree based hash.
659- But it doesn't make sense to force all uses of fs-verity to be
660- through IMA. As a standalone filesystem feature, fs-verity
661- already meets many users' needs , and it's testable like other
667+ IMA supports the fs-verity hashing mechanism as an alternative
668+ to full file hashes, for those who want the performance and
669+ security benefits of the Merkle tree based hash. However, it
670+ doesn't make sense to force all uses of fs-verity to be through
671+ IMA. fs-verity already meets many users' needs even as a
672+ standalone filesystem feature , and it's testable like other
662673 filesystem features e.g. with xfstests.
663674
664675:Q: Isn't fs-verity useless because the attacker can just modify the
0 commit comments