From: Rajiv Andrade <srajiv@linux.vnet.ibm.com>
To: Roberto Sassu <roberto.sassu@polito.it>
Cc: Mimi Zohar <zohar@linux.vnet.ibm.com>,
linux-security-module@vger.kernel.org,
linux-kernel@vger.kernel.org, jmorris@namei.org
Subject: Re: [PATCH 1/2] ima: split ima_add_digest_entry() function
Date: Wed, 16 Nov 2011 16:52:50 -0200 [thread overview]
Message-ID: <4EC40682.2050602@linux.vnet.ibm.com> (raw)
In-Reply-To: <4EC3CA9A.3070401@polito.it>
Thanks, Rajiv Andrade Security Development IBM Linux Technology Center
On 16-11-2011 12:37, Roberto Sassu wrote:
> On 11/16/2011 02:38 PM, Mimi Zohar wrote:
>> On Wed, 2011-11-16 at 11:10 +0100, Roberto Sassu wrote:
>>> The ima_add_digest_entry() function has been split in order to avoid
>>> adding an entry in the measurements list for which the PCR extend
>>> operation subsequently fails. Required memory is allocated earlier
>>> in the
>>> new function ima_prepare_template_entry() and the template entry is
>>> added
>>> after ima_pcr_extend().
>>>
>>> Signed-off-by: Roberto Sassu<roberto.sassu@polito.it>
>>
>
> Hi Mimi
>
> i don't know if this condition can happen, but suppose that
> for whatever reason the PCR extend fails. In this case, since
> the PCR is not extended, the measurements list can be modified,
> by removing the non-measured entry, without this fact being
> detected by the verifier. So, probably we can avoid to display
> the entry.
>
>
Hi Roberto,
IMA's trustworthiness is built on the assumption that the TPM underneath can
be trusted. If that can't be, the eventlog alone doesn't provide us any
security.
It's the TPM device driver's job though to workaround any HW bug so that
in the
end all its stakeholders have their commands processed successfully, as
we've
pursued in some changes here:
http://marc.info/?l=linux-kernel&m=132144742019589&w=2
<http://marc.info/?l=linux-kernel&m=132144742019589&w=2>
What you're doing is to indeed move part of that trust to the software
stack,
assuming that in case the TPM fails to process a command, you could fall
back to
the event log anyways. It isn't a matter of it's a right or wrong
software engineering
decision, but inside the trusted computing scope, it breaks the model.
Rajiv
next prev parent reply other threads:[~2011-11-16 18:53 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-11-16 10:10 [PATCH 1/2] ima: split ima_add_digest_entry() function Roberto Sassu
2011-11-16 10:10 ` [PATCH 2/2] ima: free memory of unused template entries Roberto Sassu
2011-11-16 13:38 ` [PATCH 1/2] ima: split ima_add_digest_entry() function Mimi Zohar
2011-11-16 14:37 ` Roberto Sassu
2011-11-16 18:52 ` Rajiv Andrade [this message]
2011-11-17 10:57 ` Roberto Sassu
2011-11-17 21:15 ` Mimi Zohar
2011-11-18 10:27 ` Roberto Sassu
2011-11-18 17:31 ` Mimi Zohar
2011-11-21 14:52 ` Roberto Sassu
2011-12-04 23:36 ` Mimi Zohar
2011-12-05 10:04 ` Roberto Sassu
2011-12-05 13:03 ` Mimi Zohar
2011-12-05 13:56 ` Roberto Sassu
2011-12-05 20:57 ` Mimi Zohar
2011-12-06 10:27 ` Roberto Sassu
2011-12-06 14:24 ` Mimi Zohar
2011-12-06 14:50 ` Roberto Sassu
2011-12-07 13:33 ` Kasatkin, Dmitry
2011-12-07 14:28 ` Roberto Sassu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4EC40682.2050602@linux.vnet.ibm.com \
--to=srajiv@linux.vnet.ibm.com \
--cc=jmorris@namei.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=roberto.sassu@polito.it \
--cc=zohar@linux.vnet.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.