linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Mimi Zohar <zohar@linux.vnet.ibm.com>
To: Matthew Garrett <mjg59@google.com>
Cc: Mikhail Kurinnoi <viewizard@viewizard.com>,
	linux-integrity <linux-integrity@vger.kernel.org>,
	Dmitry Kasatkin <dmitry.kasatkin@huawei.com>
Subject: Re: [RFC] EVM: Add support for portable signature format
Date: Mon, 30 Oct 2017 08:14:47 -0400	[thread overview]
Message-ID: <1509365687.3583.60.camel@linux.vnet.ibm.com> (raw)
In-Reply-To: <CACdnJusZezTrdcaRG_CQEWZqk-bm+y=Qu6fD5cchYCZPdxWyXw@mail.gmail.com>

On Mon, 2017-10-30 at 11:51 +0000, Matthew Garrett wrote:
> On Mon, Oct 30, 2017 at 11:36 AM, Mimi Zohar <zohar@linux.vnet.ibm.com> wrote:
> > On Mon, 2017-10-30 at 10:53 +0000, Matthew Garrett wrote:
> >> 2) It should be possible to write a policy that allows these files to
> >> be arbitrarily modified, including being deleted
> >
> > File deletion is not the problem, but if we allow the file metadata to
> > change, then the file verification will fail.
> 
> That seems reasonable? The policy may not be appraising all files, in
> which case having verification fail isn't a problem.
> 
> >> I'd been interpreting "immutable" in this case to mean "the kernel
> >> will never replace the signature with an hmac" rather than "the file
> >> and protected information cannot be modified". If you think the latter
> >> is necessary then I think we need two separate signature types and to
> >> handle the two separately.
> >
> > EVM, up to now, is reactive to file data and meta-data changes,
> > replacing the file signature with an HMAC.  For the new file signature
> > to be immutable it needs to prevent security.evm from changing, which
> > this patch currently does not do.
> 
> It prevents the kernel from modifying security.evm, but doesn't
> prevent userspace from doing so. But if userspace does so,
> verification will fail.

No, the current code does not prevent the signature from being
replaced with an HMAC.  Subsequent EVM verification will succeed based
on an HMAC.

  reply	other threads:[~2017-10-30 12:14 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-10-26  8:31 [RFC] EVM: Add support for portable signature format Matthew Garrett
2017-10-26  9:03 ` Mikhail Kurinnoi
2017-10-26  9:08   ` Matthew Garrett
2017-10-26  9:46     ` Mikhail Kurinnoi
2017-10-26 19:22       ` Mimi Zohar
2017-10-30 10:53         ` Matthew Garrett
2017-10-30 11:36           ` Mimi Zohar
2017-10-30 11:51             ` Matthew Garrett
2017-10-30 12:14               ` Mimi Zohar [this message]
2017-10-27 10:27 ` Dmitry Kasatkin
2017-10-30 12:30   ` Mimi Zohar
2017-10-30 13:21     ` Matthew Garrett
2017-10-30 13:58       ` Mimi Zohar
2017-10-30 14:04         ` Matthew Garrett
2017-10-27 10:41 ` Dmitry Kasatkin
2017-10-30 12:38   ` Mimi Zohar
2017-10-30 13:17     ` Matthew Garrett
2017-10-30 15:31       ` Mimi Zohar
2017-10-30 15:36         ` Matthew Garrett
2017-11-01 17:54           ` Matthew Garrett
2017-11-01 18:25             ` Mimi Zohar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1509365687.3583.60.camel@linux.vnet.ibm.com \
    --to=zohar@linux.vnet.ibm.com \
    --cc=dmitry.kasatkin@huawei.com \
    --cc=linux-integrity@vger.kernel.org \
    --cc=mjg59@google.com \
    --cc=viewizard@viewizard.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).