Bug 1187814 - IMA/EVM is not enabled in the RPM package
Summary: IMA/EVM is not enabled in the RPM package
Status: NEW
Alias: None
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Basesystem (show other bugs)
Version: Current
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Lubos Kocman
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-06-29 09:08 UTC by Alberto Planas Dominguez
Modified: 2021-08-13 11:09 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alberto Planas Dominguez 2021-06-29 09:08:24 UTC
Seems that IMA/EVM is not enabled in the openSUSE RPM package, and this makes some options in rpmsign (like --signfiles) not available by default
Comment 1 Alberto Planas Dominguez 2021-06-29 09:09:53 UTC
sr#903002 should do
Comment 2 Michael Schröder 2021-06-29 09:12:27 UTC
Why would you want to enable it? The build service cannot create such signatures. We can't really use it for SLE. I don't see how it is relevant for openSUSE.
Comment 3 Alberto Planas Dominguez 2021-06-29 09:20:08 UTC
(In reply to Michael Schröder from comment #2)
> Why would you want to enable it? The build service cannot create such
> signatures. We can't really use it for SLE. I don't see how it is relevant
> for openSUSE.

That is correct. But I want to integrate IMA in openSUSE TW / MicroOS somehow, and later in SLE Micro.

For obs-sign I created this issue:

https://github.com/openSUSE/obs-sign/issues/29

Maybe I can duplicate it here in bsc/boo. Can be that if obs-sign gains the feature for signing files, we can drop this one but I did not test the rpm ima plugin yet (even tho we distribute it)
Comment 4 Michael Schröder 2021-06-29 10:25:22 UTC
Well, we can't do this easily. Signing each file individually would absolutely kill the signer. It's currently bad enough with the kernel modules.

I'm not saying that this can't be done, but the current way we create signatures is simply too slow. So there's a major effort needed to change the way the signer works. (e.g. by no longer calling gpg for each signature but use libgcrypt directly.)
Comment 8 Chenzi Cao 2021-08-13 11:09:04 UTC
Hi Lubos, would you please take a look at this issue? Maybe it can be closed as FEATURE?