From: Ken Goldman <kgold@linux.ibm.com>
To: "Guozihua (Scott)" <guozihua@huawei.com>,
Mimi Zohar <zohar@linux.ibm.com>,
Enrico Bravi <enrico.bravi@polito.it>,
linux-integrity@vger.kernel.org, roberto.sassu@huawei.com
Cc: Silvia Sisinni <silvia.sisinni@polito.it>
Subject: Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
Date: Tue, 26 Dec 2023 10:36:39 -0500 [thread overview]
Message-ID: <3da78a77-9bfb-45c7-9979-2dba6fe27f37@linux.ibm.com> (raw)
In-Reply-To: <46e0fd93-86f6-bdf9-99d4-1ccf83f88afe@huawei.com>
On 12/25/2023 8:00 AM, Guozihua (Scott) wrote:
>> After thinking about this some more, I realized that we didn't discuss
>> carrying the measurement list across kexec. How will the kexec'ed
>> kernel be able to differentiate between the original and new
>> measurement list? Neither the Kconfig nor making SHA1 backwards
>> compatible address this. How will attestation servers be able to
>> differentiate between the two logs?
>>
>> Obviously the new measurement list with larger digests won't be
>> backwards compatible. Can we support carrying the original measurement
>> list across kexec to a new kernel?
>>
>> As long we're making changes to the IMA measurement list, we should
>> mention that we could include multiple digests, but I don't think it is
>> necessary.
>>
>>>>> An example of the resulting ima log is the following:
>>>>>
>>>>> 10 sha256:64326[...]25313 ima-ng sha1:5fc9b[...]974e6 boot_aggregate
>>>>> 10 sha256:afd64[...]e3123 ima-ng sha1:5a493[...]f9566 /init
>>>>> 10 sha256:99329[...]a6353 ima-ng sha1:8c87d[...]3d8c7 /usr/bin/sh
>>>>> 10 sha256:a16ad[...]2ac0e ima-ng sha1:59d4b[...]330b0 /etc/ld.so.cache
>> The template DATA_FMT_DIGEST_WITH_ALGO field is a composite field
>> defined as <hash algo> + ':' + '\0' + digest. The above ascii display
>> looks like the template composite field, but isn't. It is two separate
>> fields. Perhaps it should look differently as well. Consider instead
>> of a string use the hash_algo value (include/uapi/linux/hash_info.h).
>>
>> binary measurement log: <pcr> <hash_algo> <digest_len> <digest>
>>
> Hi Mimi and Enrico,
>
> As we are extending all supported algorithms of a PCR bank, does
> algorithm of template-hash still matters?
>
From a security and verification viewpoint, I think you are correct.
The template hash is redundant, and can always be calculated from the
template data. In that sense, the template hash can be removed.
On the other hand there is one benefit to the template hash. If there is
a bug in the software that creates the event log or the software that
consumes the event log, the template hash may help to determine which
event has a bug.
If the new event log has a template hash, I do believe that it also
needs a hash algorithm.
next prev parent reply other threads:[~2023-12-26 15:36 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-12-14 14:51 [RFC][PATCH] ima: add crypto agility support for template-hash algorithm Enrico Bravi
2023-12-19 20:54 ` Mimi Zohar
2023-12-21 14:38 ` Enrico Bravi
2023-12-21 22:05 ` Mimi Zohar
2023-12-25 13:00 ` Guozihua (Scott)
2023-12-26 15:36 ` Ken Goldman [this message]
2023-12-27 14:03 ` Mimi Zohar
2024-01-09 17:05 ` Silvia Sisinni
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=3da78a77-9bfb-45c7-9979-2dba6fe27f37@linux.ibm.com \
--to=kgold@linux.ibm.com \
--cc=enrico.bravi@polito.it \
--cc=guozihua@huawei.com \
--cc=linux-integrity@vger.kernel.org \
--cc=roberto.sassu@huawei.com \
--cc=silvia.sisinni@polito.it \
--cc=zohar@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox