linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* CAP_SYS_ADMIN requirement for updating IMA metadata
@ 2019-05-22 14:54 Chuck Lever
  2019-05-22 15:19 ` Mimi Zohar
  0 siblings, 1 reply; 6+ messages in thread
From: Chuck Lever @ 2019-05-22 14:54 UTC (permalink / raw)
  To: Mimi Zohar; +Cc: linux-integrity

Hi Mimi-

I'm working on a section of draft-ietf-nfsv4-integrity-measurement that
discusses what kind of access permission is necessary to update a file's
IMA metadata. This is needed because every NFS operation has an associated
user ID -- an NFS server implementer needs to know which users are allowed
to alter the IMA metadata.

On Linux, because the metadata is stored in "security.ima", CAP_SYS_ADMIN
is required.

But on other NFS server implementations (ones that might not have a
capabilities system), IMA metadata could be stored via a mechanism that
does not require any special permission.

And, it seems to me that if a user can alter the file content, there is
no additional harm in her being allowed to update the IMA metadata.

Is there an architectural reason, other than that Linux stores IMA metadata
in a security.* xattr, for requiring a superuser privilege to update IMA
metadata?

Thanks in advance for any insight!


--
Chuck Lever




^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2019-05-30 22:40 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-05-22 14:54 CAP_SYS_ADMIN requirement for updating IMA metadata Chuck Lever
2019-05-22 15:19 ` Mimi Zohar
2019-05-22 15:49   ` Chuck Lever
2019-05-23 13:25     ` Mimi Zohar
2019-05-30 17:34       ` Chuck Lever
2019-05-30 22:40         ` Mimi Zohar

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).