public inbox for linux-integrity@vger.kernel.org
 help / color / mirror / Atom feed
From: Mimi Zohar <zohar@linux.vnet.ibm.com>
To: Alban Crequy <alban.crequy@gmail.com>
Cc: linux-integrity@vger.kernel.org,
	Seth Forshee <seth.forshee@canonical.com>,
	"Eric W . Biederman" <ebiederm@xmission.com>,
	dmitry.kasatkin@gmail.com, Sascha Hauer <s.hauer@pengutronix.de>,
	Alban Crequy <alban@kinvolk.io>,
	dongsu@kinvolk.io
Subject: Re: [PATCH] ima: define a new policy option named "force"
Date: Wed, 10 Jan 2018 09:39:10 -0500	[thread overview]
Message-ID: <1515595150.5739.41.camel@linux.vnet.ibm.com> (raw)
In-Reply-To: <CAMXgnP4wsiu5iizCMZ4T=iPvNEa0sr_VdMP4bPibs9+Pq3nmQw@mail.gmail.com>

On Wed, 2018-01-10 at 15:13 +0100, Alban Crequy wrote:
> > There are times instead of relying on previously cached status
> > information we want to force the file to be re-measured, re-appraised,
> > and re-audited.
> >
> > This patch defines a new policy option named "force", which forces
> > files to be re-measured, re-appraised or re-audited.
> >
> > Signed-off-by: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
> 
> Tested-by: Alban Crequy <alban@kinvolk.io>

Thanks!  The builtin policies should be updated to require force for
fuse filesystems.  I was expecting to receive patches (from Seth) to
update the builtin policies and upstream them together.

Mimi

> 
> tl;dr: without the patch, the measurements don't get all the changes
> on FUSE. With the patch and when enabling the "force" option,
> ascii_runtime_measurements gets the updated measurements.
> 
> 
> Longer explanation:
> 
> The test I did was using a patched version of the memfs FUSE driver
> [1][2] and two very simple "hello-world" programs [4] (prog1 prints
> "hello world: 1" and prog2 prints "hello world: 2").
> 
> I copy prog1 and prog2 in the fuse-memfs mount point, execute them and
> check the sha1 hash in
> "/sys/kernel/security/ima/ascii_runtime_measurements".
> 
> My patch on the memfs FUSE driver added a backdoor command to serve
> prog1 when the kernel asks for prog2 or vice-versa. In this way, I can
> exec prog1 and get it to print "hello world: 2" without ever replacing
> the file via the VFS, so the kernel is not aware of the change.
> 
> The test was done using Dongsu's branch "fuse-userns-v5-2" [3],
> including both this new force option and Sascha's patch ("ima: Use
> i_version only when filesystem supports it").
> 
> 
> Step by step test procedure:
> 
> 1.  Mount the memfs FUSE using [2]:
> rm -f  /tmp/memfs-switch* ; memfs -L DEBUG  /mnt/memfs
> 
> 2. Copy prog1 and prog2 using [4]
> cp prog1 /mnt/memfs/prog1
> cp prog2 /mnt/memfs/prog2
> 
> 3. Lookup the files and let the FUSE driver to keep the handles open:
> dd if=/mnt/memfs/prog1 bs=1 | (read -n 1 x ; sleep 3600 ) &
> dd if=/mnt/memfs/prog2 bs=1 | (read -n 1 x ; sleep 3600 ) &
> 
> 4. Check the 2 programs work correctly:
> $ /mnt/memfs/prog1
> hello world: 1
> $ /mnt/memfs/prog2
> hello world: 2
> 
> 5.  Check the measurements for prog1 and prog2:
> $ sudo cat /sys/kernel/security/ima/ascii_runtime_measurements|grep
> /mnt/memfs/prog
> 10 7ac5aed52061cb09120e977c6d04ee5c7b11c371 ima-ng
> sha1:ac14c9268cd2811f7a5adea17b27d84f50e1122c /mnt/memfs/prog1
> 10 9acc17a9a32aec4a676b8f6558e17a3d6c9a78e6 ima-ng
> sha1:799cb5d1e06d5c37ae7a76ba25ecd1bd01476383 /mnt/memfs/prog2
> 
> 6. Use the backdoor command in my patched memfs to redirect file
> operations on file handle 3 to file handle 2:
> rm -f  /tmp/memfs-switch* ; touch /tmp/memfs-switch-3-2
> 
> 7. Check how the FUSE driver serves different content for the files:
> $ /mnt/memfs/prog1
> hello world: 2
> $ /mnt/memfs/prog2
> hello world: 2
> 
> 8. Check the measurements:
> sudo cat /sys/kernel/security/ima/ascii_runtime_measurements|grep
> /mnt/memfs/prog
> 
> Without the patches, on a vanilla kernel, there are no new
> measurements, despite the FUSE driver having served different
> executables. Same thing with the patch but without enabling the new
> force option.
> 
> However, with the "force" option enabled, I can see additional
> measurements for prog1 and prog2 with the hashes reversed when the
> FUSE driver served the alternative content.
> 
> 
> [1] https://github.com/bbengfort/memfs
> [2] https://github.com/kinvolk/memfs/commits/alban/switch-files
> [3] https://github.com/kinvolk/linux/commits/dongsu/fuse-userns-v5-2
> [4] https://github.com/kinvolk/fuse-userns-patches/commit/cf1f5750cab0
> 

  reply	other threads:[~2018-01-10 14:44 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-10 14:13 [PATCH] ima: define a new policy option named "force" Alban Crequy
2018-01-10 14:39 ` Mimi Zohar [this message]
2018-01-10 14:44   ` Seth Forshee
2018-01-10 14:48     ` Mimi Zohar
2018-01-11 13:59       ` Alban Crequy
  -- strict thread matches above, loose matches on Subject: below --
2017-12-08 18:12 Mimi Zohar
2017-12-10 22:07 ` James Morris
2017-12-11 13:12   ` Mimi Zohar
2017-12-11 13:30     ` Seth Forshee

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1515595150.5739.41.camel@linux.vnet.ibm.com \
    --to=zohar@linux.vnet.ibm.com \
    --cc=alban.crequy@gmail.com \
    --cc=alban@kinvolk.io \
    --cc=dmitry.kasatkin@gmail.com \
    --cc=dongsu@kinvolk.io \
    --cc=ebiederm@xmission.com \
    --cc=linux-integrity@vger.kernel.org \
    --cc=s.hauer@pengutronix.de \
    --cc=seth.forshee@canonical.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox