LPC2009: Using IMA for Integrity Measurement and Attestation by David Safford
authorDobrica Pavlinusic <dpavlin@rot13.org>
Sun, 1 Nov 2009 14:53:50 +0000 (15:53 +0100)
committerDobrica Pavlinusic <dpavlin@rot13.org>
Sun, 1 Nov 2009 14:53:50 +0000 (15:53 +0100)
media/lpc2009-Using_IMA/hCalendar.html [new file with mode: 0644]
media/lpc2009-Using_IMA/video.srt.yaml [new file with mode: 0644]
media/lpc2009-Using_IMA/www [new file with mode: 0644]
media/olf2009-Developing_for_non-x86_targets_using_QEMU/presentation.pdf [new symlink]

diff --git a/media/lpc2009-Using_IMA/hCalendar.html b/media/lpc2009-Using_IMA/hCalendar.html
new file mode 100644 (file)
index 0000000..860a011
--- /dev/null
@@ -0,0 +1,18 @@
+<!-- http://microformats.org/wiki/hcalendar -->
+<div class="vevent">
+ <span class="organiser">
+David Safford
+ </span>
+ <span class="summary">
+Using IMA for Integrity Measurement and Attestation
+ </span>
+ <br>
+ <a class="url" href="http://linuxplumbersconf.org/ocw/proposals/34">Linux Plumbers Conference</a>,
+ <span class="location">Portland, OR</span>,
+ <abbr class="dtstart" title="2009-09-24">Thursday, September 24, 2009 from 11:35am – Noon</span>
+ <div class="description">
+Linux 2.6.30 includes the Integrity Measurement Architecture (IMA) system, which measures (hashes) files before they are accessed, and which can use a TPM for hardware signed attestation for centralized management of client integrity.
+<br>
+This talk will cover configuration and use of 2.6.30’s new Integrity Measurement Architecture (IMA). It will discuss IMA measurement policies, use and configuration of a hardware TPM for report signature and validation, and how to generate and use Trusted Computing Group standard formats and protocols for network admission and health-check. The talk will include demonstration of open source applications and libraries for these capabilities.
+ </div>
+</div>
diff --git a/media/lpc2009-Using_IMA/video.srt.yaml b/media/lpc2009-Using_IMA/video.srt.yaml
new file mode 100644 (file)
index 0000000..883a4b0
--- /dev/null
@@ -0,0 +1,96 @@
+---
+- 4.9
+- 7.1
+- "[1] Using IMA for Integrity Measurement and Attestation\n"
+---
+- 34.9
+- 35.9
+- '[2] Integrity Measurement Architecture (IMA)'
+---
+- 96.5
+- 97.5
+- '[3] http://linux-ima.sourceforge.net/'
+---
+- 222.1
+- 223.1
+- '[4] A Blatant Plug'
+---
+- 232.8
+- 233.8
+- '[5] Trusted Platform Module (TPM)'
+---
+- 281.2
+- 282.2
+- '[6] TPM as a Root of Trust'
+---
+- 403.9
+- 404.9
+- '[7] SMM Attack on DRTM (Rutowska, Blackhat 2009)'
+---
+- 502.6
+- 503.6
+- '[8] Addressing the generalized problem'
+---
+- 572.5
+- 573.5
+- '[9] Integrity Measurement Architecture (IMA)'
+---
+- 608.1
+- 609.1
+- '[10] Using IMA – the basics'
+---
+- 707.7
+- 708.7
+- '[11] IMA Raw output'
+---
+- 864.3
+- 865.3
+- '[12] IMA Measurement Policy'
+---
+- 917.9
+- 918.9
+- '[13] IMA Policy language'
+---
+- 994.2
+- 995.2
+- '[14] IMA ima_tcb=1 default policy'
+---
+- 1021.3
+- 1022.3
+- '[15] Example LSM Specific Measurement Policy'
+---
+- 1056.1
+- 1057.1
+- '[16] IMA messages – when IMA Can’t Measure a file'
+---
+- 1214.1
+- 1215.1
+- '[17] IMA with TPM'
+---
+- 1236.1
+- 1237.1
+- '[18] Detecting and Isolating Compromised Systems'
+---
+- 1299.4
+- 1300.4
+- '[19] Using Platform Trust Services (PTS)'
+---
+- 1422.3
+- 1423.3
+- '[20] Attestation 802.1x-TNC-PTS'
+---
+- 1504.5
+- 1505.5
+- '[21] 802.1x-TNC-PTS in Virtualized Environments'
+---
+- 1580.2
+- 1581.2
+- '[22] 802.1x-TNC-PTS-IMA Resources'
+---
+- 1625.5
+- 1626.5
+- '[23] Future work – EVM – Local “Appraisal”'
+---
+- 1733.9
+- 1734.9
+- '[24] Summary'
diff --git a/media/lpc2009-Using_IMA/www b/media/lpc2009-Using_IMA/www
new file mode 100644 (file)
index 0000000..a635cd7
--- /dev/null
@@ -0,0 +1,2 @@
+http://linuxplumbersconf.org/2009/slides/David-Stafford-IMA_LPC.pdf
+http://podcasts.linux-foundation.org/ogg/LPC2009/David%20Safford.ogg
diff --git a/media/olf2009-Developing_for_non-x86_targets_using_QEMU/presentation.pdf b/media/olf2009-Developing_for_non-x86_targets_using_QEMU/presentation.pdf
new file mode 120000 (symlink)
index 0000000..31d1ac6
--- /dev/null
@@ -0,0 +1 @@
+OHL-developing-on-nonx86-systems.pdf
\ No newline at end of file