On Tue, 2021-01-05 at 13:05 -0500, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/Signed_RPM_Contents
> 
> Note that this change was submitted after the deadline, but since it
> can be shipped in an complete state, I am still processing it for
> Fedora 34.
> 
> 
> == Summary ==
> We want to add signatures to individual files that are part of
> shipped RPMs.
> These signatures will use the Linux IMA (Integrity Measurement
> Architecture) scheme, which means they can be used to enforce runtime
> policies to ensure execution of only trusted files.
> 
Is there any relation between this and fapolicyd, that seems to be
developed mostly by Red Hat employees?

https://github.com/linux-application-whitelisting/fapolicyd


-- 
Michel Alexandre Salim
profile: https://keyoxide.org/mic...@michel-slm.name
chat via email: https://delta.chat/
GPG key: 5DCE 2E7E 9C3B 1CFF D335 C1D7 8B22 9D2F 7CCC 04F2

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to