From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:49890 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754770AbdJIRv7 (ORCPT ); Mon, 9 Oct 2017 13:51:59 -0400 Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id v99HmtM0078966 for ; Mon, 9 Oct 2017 13:51:58 -0400 Received: from e06smtp10.uk.ibm.com (e06smtp10.uk.ibm.com [195.75.94.106]) by mx0b-001b2d01.pphosted.com with ESMTP id 2dg9jb7sy4-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Mon, 09 Oct 2017 13:51:58 -0400 Received: from localhost by e06smtp10.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 9 Oct 2017 18:51:57 +0100 Received: from d23av06.au.ibm.com (d23av06.au.ibm.com [9.190.235.151]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id v99HpsK18650840 for ; Mon, 9 Oct 2017 17:51:55 GMT Received: from d23av06.au.ibm.com (localhost [127.0.0.1]) by d23av06.au.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id v99HpsKZ010998 for ; Tue, 10 Oct 2017 04:51:54 +1100 Subject: Re: RFC: Make it practical to ship EVM signatures From: Mimi Zohar To: Matthew Garrett Cc: linux-integrity@vger.kernel.org, Mikhail Kurinnoi Date: Mon, 09 Oct 2017 13:51:51 -0400 In-Reply-To: References: <20170927221653.11219-1-mjg59@google.com> <1506629560.5691.33.camel@linux.vnet.ibm.com> <1506646397.5691.64.camel@linux.vnet.ibm.com> <1506711726.5691.141.camel@linux.vnet.ibm.com> <1506715304.5691.151.camel@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Message-Id: <1507571511.3748.9.camel@linux.vnet.ibm.com> Sender: linux-integrity-owner@vger.kernel.org List-ID: > >> I'm not really clear on what attacks are prevented by using the inode > >> number. If I'm able to preserve all the other security metadata when > >> copying a file, I can just create a hardlink to the original instead > >> and have the same outcome. > > > > The issue is the ability of having different security metadata, not > > the same security metadata. (I need to refresh my memory as to hard > > links, and whether they can have different security metadata.) > > If the security metadata is different then copying another > security.evm will fail, surely? The assumption here is that security.ima exists and is included in the HMAC calculation. For files which are not included in the IMA policy, the only thing binding the file data and metadata is the i_ino and uuid. Mimi