Blame SOURCES/fapolicyd-0.9.5-integrity.patch

a749e0
diff -urp fapolicyd-0.9.5.orig/doc/fapolicyd.conf.5 fapolicyd-0.9.5/doc/fapolicyd.conf.5
a749e0
--- fapolicyd-0.9.5.orig/doc/fapolicyd.conf.5	2020-05-22 10:03:14.000000000 -0400
a749e0
+++ fapolicyd-0.9.5/doc/fapolicyd.conf.5	2020-05-22 10:04:32.583100229 -0400
a749e0
@@ -55,26 +55,6 @@ This is a comma separated list of file s
a749e0
 This is a comma separated list of trust back-ends. If this is not configured, rpmdb is default. Fapolicyd supports \fBfile\fP back-end that reads content of /etc/fapolicyd/fapolicyd.trust and use it as a list of trusted files. The second option is \fBrpmdb\fP backend that generates list of trusted files from rpmdb.
a749e0
 
a749e0
 .TP
a749e0
-.B integrity
a749e0
-This option tells fapolicyd which integrity strategy it should use. It can be one of 4 values:
a749e0
-.RS
a749e0
-.TP 12
a749e0
-.B none
a749e0
-This is the
a749e0
-.IR default
a749e0
-and does no integrity checking.
a749e0
-.TP
a749e0
-.B size
a749e0
-Selecting this option will compare the size of the file with what it was knows to be. This is better than nothing and very fast since fapolicyd already collects size information during normal processing. However, an attacker could replace the file and as long as the size matches, it will not be detected.
a749e0
-.TP
a749e0
-.B ima
a749e0
-Selecting this option will use a SHA256 hash that the IMA subsystem places in a file's extended attributes in addition to the size check. This means that all file systems holding executable code must support extended attributes.
a749e0
-.RE
a749e0
-.TP
a749e0
-.B sha256
a749e0
-Selecting this option will calculate a SHA256 hash by cryptographic means. A size check will also be performed.
a749e0
-
a749e0
-.TP
a749e0
 .B syslog_format
a749e0
 This option controls how the output from the access decision is formatted. The format is a comma separated list of subject and object names from the rules. It does not allow the keyword "all". It also allows for rule, dec, and perm. The format must include a semi-colon to deliniate subject from object keywords. The typical use is to place information about the access decision, then subject information, a colon, and the object information. Also note that the more things being logged, the more it will impact system performance. Also, the event written is limited to 512 bytes.
a749e0
 
a749e0
diff -urp fapolicyd-0.9.5.orig/init/fapolicyd.conf fapolicyd-0.9.5/init/fapolicyd.conf
a749e0
--- fapolicyd-0.9.5.orig/init/fapolicyd.conf	2020-05-22 10:03:14.000000000 -0400
a749e0
+++ fapolicyd-0.9.5/init/fapolicyd.conf	2020-05-22 10:04:46.801098703 -0400
a749e0
@@ -15,5 +15,4 @@ subj_cache_size = 1549
a749e0
 obj_cache_size = 8191
a749e0
 watch_fs = ext2,ext3,ext4,tmpfs,xfs,vfat,iso9660
a749e0
 trust = rpmdb,file
a749e0
-integrity = none
a749e0
 syslog_format = rule,dec,perm,auid,pid,exe,:,path,ftype
a749e0
diff -urp fapolicyd-0.9.5.orig/src/daemon/daemon-config.c fapolicyd-0.9.5/src/daemon/daemon-config.c
a749e0
--- fapolicyd-0.9.5.orig/src/daemon/daemon-config.c	2020-05-22 10:03:14.000000000 -0400
a749e0
+++ fapolicyd-0.9.5/src/daemon/daemon-config.c	2020-05-22 10:05:35.103093520 -0400
a749e0
@@ -538,9 +538,9 @@ static int trust_parser(const struct nv_
a749e0
 static const struct nv_list integrity_schemes[] =
a749e0
 {
a749e0
   {"none",   IN_NONE   },
a749e0
-  {"size",   IN_SIZE   },
a749e0
+/*  {"size",   IN_SIZE   },
a749e0
   {"ima",    IN_IMA    },
a749e0
-  {"sha256", IN_SHA256 },
a749e0
+  {"sha256", IN_SHA256 }, */
a749e0
   { NULL,  0 }
a749e0
 };
a749e0