From: Mimi Zohar <zohar@linux.ibm.com>
To: Roberto Sassu <roberto.sassu@huawei.com>,
dmitry.kasatkin@huawei.com, mjg59@google.com
Cc: linux-integrity@vger.kernel.org,
linux-security-module@vger.kernel.org, linux-doc@vger.kernel.org,
stable@vger.kernel.org, linux-kernel@vger.kernel.org,
silviu.vlasceanu@huawei.com
Subject: Re: [PATCH v3 0/2] ima/evm fixes for v5.2
Date: Thu, 06 Jun 2019 10:49:56 -0400 [thread overview]
Message-ID: <1559832596.4278.124.camel@linux.ibm.com> (raw)
In-Reply-To: <3711f387-3aef-9fbb-1bb4-dded6807b033@huawei.com>
On Thu, 2019-06-06 at 13:43 +0200, Roberto Sassu wrote:
> On 6/6/2019 1:26 PM, Roberto Sassu wrote:
> > Previous versions included the patch 'ima: don't ignore INTEGRITY_UNKNOWN
> > EVM status'. However, I realized that this patch cannot be accepted alone
> > because IMA-Appraisal would deny access to new files created during the
> > boot. With the current behavior, those files are accessible because they
> > have a valid security.ima (not protected by EVM) created after the first
> > write.
> >
> > A solution for this problem is to initialize EVM very early with a random
> > key. Access to created files will be granted, even with the strict
> > appraisal, because after the first write those files will have both
> > security.ima and security.evm (HMAC calculated with the random key).
> >
> > Strict appraisal will work only if it is done with signatures until the
> > persistent HMAC key is loaded.
>
> Changelog
>
> v2:
> - remove patch 1/3 (evm: check hash algorithm passed to init_desc());
> already accepted
> - remove patch 3/3 (ima: show rules with IMA_INMASK correctly);
> already accepted
> - add new patch (evm: add option to set a random HMAC key at early boot)
> - patch 2/3: modify patch description
Roberto, as I tried explaining previously, this feature is not a
simple bug fix. These patches, if upstreamed, will be upstreamed the
normal way, during an open window. Whether they are classified as a
bug fix has yet to be decided.
Please stop Cc'ing stable. If I don't Cc stable before sending the pull request, then Greg and Sasha have been really good about deciding which patches should be backported. (Please refer to the comment on "Cc'ing stable" in section "5) Select the recipients for your patch" in Documentation/process/submitting-patches.rst.)
I'll review these patches, but in the future please use an appropriate patch set cover letter title in the subject line.
thanks,
Mimi
>
> v1:
> - remove patch 2/4 (evm: reset status in evm_inode_post_setattr()); file
> attributes cannot be set if the signature is portable and immutable
> - patch 3/4: add __ro_after_init to ima_appraise_req_evm variable
> declaration
> - patch 3/4: remove ima_appraise_req_evm kernel option and introduce
> 'enforce-evm' and 'log-evm' as possible values for ima_appraise=
> - remove patch 4/4 (ima: only audit failed appraisal verifications)
> - add new patch (ima: show rules with IMA_INMASK correctly)
>
>
> > Roberto Sassu (2):
> > evm: add option to set a random HMAC key at early boot
> > ima: add enforce-evm and log-evm modes to strictly check EVM status
> >
> > .../admin-guide/kernel-parameters.txt | 11 ++--
> > security/integrity/evm/evm.h | 10 +++-
> > security/integrity/evm/evm_crypto.c | 57 ++++++++++++++++---
> > security/integrity/evm/evm_main.c | 41 ++++++++++---
> > security/integrity/ima/ima_appraise.c | 8 +++
> > security/integrity/integrity.h | 1 +
> > 6 files changed, 106 insertions(+), 22 deletions(-)
> >
>
next prev parent reply other threads:[~2019-06-06 14:50 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-06 11:26 [PATCH v3 0/2] ima/evm fixes for v5.2 Roberto Sassu
2019-06-06 11:26 ` [PATCH v3 1/2] evm: add option to set a random HMAC key at early boot Roberto Sassu
2019-06-06 11:26 ` [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status Roberto Sassu
2019-06-07 14:24 ` Mimi Zohar
2019-06-07 14:40 ` Roberto Sassu
2019-06-07 15:08 ` Mimi Zohar
2019-06-07 15:14 ` Roberto Sassu
2019-06-07 15:25 ` Mimi Zohar
2019-06-06 11:43 ` [PATCH v3 0/2] ima/evm fixes for v5.2 Roberto Sassu
2019-06-06 14:49 ` Mimi Zohar [this message]
2019-06-06 15:22 ` Roberto Sassu
2019-06-12 11:28 ` Janne Karhunen
2019-06-12 13:11 ` Roberto Sassu
2019-06-12 13:38 ` Janne Karhunen
2019-06-12 16:33 ` Roberto Sassu
2019-06-13 6:01 ` Janne Karhunen
2019-06-13 6:57 ` Roberto Sassu
2019-06-13 7:39 ` Janne Karhunen
2019-06-13 7:50 ` Roberto Sassu
2019-06-13 8:04 ` Janne Karhunen
2019-06-13 8:51 ` Roberto Sassu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1559832596.4278.124.camel@linux.ibm.com \
--to=zohar@linux.ibm.com \
--cc=dmitry.kasatkin@huawei.com \
--cc=linux-doc@vger.kernel.org \
--cc=linux-integrity@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=mjg59@google.com \
--cc=roberto.sassu@huawei.com \
--cc=silviu.vlasceanu@huawei.com \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).