From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx2.suse.de ([195.135.220.15]:39947 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755369AbdKMUSc (ORCPT ); Mon, 13 Nov 2017 15:18:32 -0500 Date: Mon, 13 Nov 2017 21:18:30 +0100 From: "Luis R. Rodriguez" To: Mimi Zohar Cc: "Luis R. Rodriguez" , David Howells , linux-integrity , linux-fsdevel , linux-kernel , Andy Lutomirski , James Bottomley , David Woodhouse , Kyle McMartin , Ben Hutchings , Alan Cox , Greg Kroah-Hartman , Linus Torvalds , Kees Cook , "AKASHI, Takahiro" Subject: Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware Message-ID: <20171113201830.GF22894@wotan.suse.de> References: <1510573414.3404.109.camel@linux.vnet.ibm.com> <20171113190505.GC22894@wotan.suse.de> <1510601807.3711.16.camel@linux.vnet.ibm.com> <20171113195154.GE22894@wotan.suse.de> <1510603872.3711.36.camel@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1510603872.3711.36.camel@linux.vnet.ibm.com> Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Mon, Nov 13, 2017 at 03:11:12PM -0500, Mimi Zohar wrote: > On Mon, 2017-11-13 at 20:51 +0100, Luis R. Rodriguez wrote: > > On Mon, Nov 13, 2017 at 02:36:47PM -0500, Mimi Zohar wrote: > > > > Huh, I kind of lost you here. �What does "it" refer to in the above > > > sentence? �IMA is in the kernel. �So, who does what checks in > > > userspace? > > > > Sorry I thought some checks were done in userspace, given that is clarified, > > what I meant is that say a device driver has a signing specification written > > out in the driver, should/can IMA use that on the LSM to verify the detached > > signature file for the firmware? > > IMA-appraisal currently supports file signatures as extended > attributes. �Thiago Bauermann posted patches for including appended > signature support to IMA-appraisal. �If someone is interested in > adding detached signature support, they're welcome to do so. Neat. > > If it can be all done in kernel, it has me wondering if perhaps one option for > > IMA might be to do only vetting for these types of checks, where the info and > > description to appraise files is all in-kernel. IMA would not be required > > for other files. > > We probably can defer this discussion until it is applicable. Fair enough :) Luis