linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Roberto Sassu <roberto.sassu@huawei.com>
To: Mimi Zohar <zohar@linux.ibm.com>,
	"matthewgarrett@google.com" <matthewgarrett@google.com>
Cc: "linux-integrity@vger.kernel.org"
	<linux-integrity@vger.kernel.org>,
	Silviu Vlasceanu <Silviu.Vlasceanu@huawei.com>
Subject: RE: Immutable metadata
Date: Tue, 31 Mar 2020 06:56:44 +0000	[thread overview]
Message-ID: <a6e429a09f6c4349ba2e2dc04acd89ee@huawei.com> (raw)
In-Reply-To: <1585593405.5188.450.camel@linux.ibm.com>

> -----Original Message-----
> From: Mimi Zohar [mailto:zohar@linux.ibm.com]
> Sent: Monday, March 30, 2020 8:37 PM
> To: Roberto Sassu <roberto.sassu@huawei.com>;
> matthewgarrett@google.com
> Cc: linux-integrity@vger.kernel.org; Silviu Vlasceanu
> <Silviu.Vlasceanu@huawei.com>
> Subject: Re: Immutable metadata
> 
> On Mon, 2020-03-30 at 15:56 +0000, Roberto Sassu wrote:
> > > -----Original Message-----
> > > From: Mimi Zohar [mailto:zohar@linux.ibm.com]
> > > Sent: Monday, March 30, 2020 5:47 PM
> > > To: Roberto Sassu <roberto.sassu@huawei.com>;
> > > matthewgarrett@google.com
> > > Cc: linux-integrity@vger.kernel.org; Silviu Vlasceanu
> > > <Silviu.Vlasceanu@huawei.com>
> > > Subject: Re: Immutable metadata
> > >
> > > On Sun, 2020-03-29 at 22:10 -0400, Mimi Zohar wrote:
> > > > Hi Roberto,
> > > >
> > > > On Sat, 2020-03-28 at 11:18 +0000, Roberto Sassu wrote:
> > > > > Hi Matthew, Mimi
> > > > >
> > > > > I have a question about portable signatures. Is there any particular
> > > reason
> > > > > why a write to a file is not denied by IMA if metadata are immutable?
> > > >
> > > > As much as possible, IMA and EVM should be independent of each
> other.
> > > >  EVM is responsible for the integrity of file metadata, so it needs to
> > > > read other security xattrs, but IMA shouldn't be looking at the EVM
> > > > xattr.
> > > >
> > > > Like any other security xattr, responsibility for maintaining the
> > > > xattr is left up to the particular LSM.  In this case, EVM would need
> > > > to prevent the file from being opened rw.  Should that be hard coded
> > > > or based on an EVM policy?
> > >
> > > Thinking about this a bit more, evm_verifyxattr() is already returning
> > > INTEGRITY_PASS_IMMUTABLE.  I guess IMA could make decisions based
> on
> > > it.
> >
> > Yes, this was the idea.
> >
> > I would say also that files with portable signatures fulfill the
> appraise_type=imasig
> > requirement. I would set the IMA_DIGSIG bit in iint->atomic_flags. Is it ok?
> 
> Ok, so locking doesn't seem to be an issue here.  I'm not sure about
> re-using the existing bit.  EVM_XATTR_PORTABLE_DIGSIG is dependent on
> the existence of a file hash.  The existing bit prevents calculating
> and writing the file hash as an xattr.  Would this affect installing
> new files?

Since it is a portable signature, security.ima is known in advance. IMA ability
to update security.ima is not necessary in this case. security.ima will be set
by user space tools.

Currently, there is still the issue of adding all xattrs to a file when EVM is
enforcing (it refuses to copy all xattrs, as the integrity of the partial set cannot
be verified). I will address this later.

Roberto

HUAWEI TECHNOLOGIES Duesseldorf GmbH, HRB 56063
Managing Director: Li Peng, Li Jian, Shi Yanli

      reply	other threads:[~2020-03-31  6:56 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-03-28 11:18 Immutable metadata Roberto Sassu
2020-03-30  2:10 ` Mimi Zohar
2020-03-30 15:46   ` Mimi Zohar
2020-03-30 15:56     ` Roberto Sassu
2020-03-30 18:36       ` Mimi Zohar
2020-03-31  6:56         ` Roberto Sassu [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=a6e429a09f6c4349ba2e2dc04acd89ee@huawei.com \
    --to=roberto.sassu@huawei.com \
    --cc=Silviu.Vlasceanu@huawei.com \
    --cc=linux-integrity@vger.kernel.org \
    --cc=matthewgarrett@google.com \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).