From: Pavel Machek <pavel@ucw.cz>
To: Reiner Sailer <sailer@watson.ibm.com>
Cc: LKLM <linux-kernel@vger.kernel.org>,
LSM <linux-security-module@mail.wirex.com>,
Kylene Hall <kylene@us.ibm.com>,
Emily Rattlif <emilyr@us.ibm.com>, Tom Lendacky <toml@us.ibm.com>,
Greg KH <greg@kroah.com>, Chris Wright <chrisw@osdl.org>,
Reiner Sailer <sailer@us.ibm.com>
Subject: Re: [PATCH] 2 of 5 IMA: documentation patch
Date: Fri, 17 Jun 2005 14:47:01 +0200 [thread overview]
Message-ID: <20050617124701.GA12863@elf.ucw.cz> (raw)
In-Reply-To: <1118845859.2269.17.camel@secureip.watson.ibm.com>
Hi!
> --- linux-2.6.12-rc6-mm1_orig/Documentation/ima/integrity_measurements.txt 1969-12-31 19:00:00.000000000 -0500
> +++ linux-2.6.12-rc6-mm1-ima/Documentation/ima/integrity_measurements.txt 2005-06-14 16:25:05.000000000 -0400
> @@ -0,0 +1,87 @@
> +The IBM Integrity Measurement Architecture (IMA) offers means to
> +securely identify the software that was loaded into a system run-time
> +since the last reboot. The IMA builds the information necessary to
> +identify the loaded software and provides the basis for services to
> +build on top of such information. However, it does not include any
> +means that would enable remote parties to extract the information
> +itself.
> +
> +Guarantees: IMA offers "software load-guarantees" in that
> +identification of all loaded software is guaranteed to be reflected in
> +measurement data and protected in a hardware TPM security chip (if
> +available). IMA is non-intrusive and neither disturbs the system, nor
> +prevents the system from any actions. However, if running in real
> +mode, when the TPM chip is not accessible IMA might require the system
> +not to start (for security guarantee reasons).
> +
> +Limitations: IMA does not detect corruption of software once it is
> +loaded into main memory. Instead, it indicates known vulnerabilities
> +in such software (e.g., buffer overflow) by securely identifying the
> +software at load-time. Only executable files (binaries, libraries,
> +kernel modules) are measured by default. However, IMA offers a
> +ima file system that enables applications to instruct the kernel to
> +measure files that they have opened (/ima/measurereq).
> +
> +Assumed usage: Verify system installed software configurations and
> +system run-time integrity from a secure management location.
You say that you must panic system if TPM is not acessible during
bootup. That smells just plain wrong. If I want to trick secure
managment point, what prevents me from booting kernel in "test" mode,
and then lie about it?
> +Some of our work shows that IMA is very useful to detect Rootkit
> +exploits that totally take over the software of a Linux system but
> +cannot hide themselves from contributing to the TPM aggregate and this
> +will be detectable from a non-corrupted platform. While the corrupted
> +system might not show the Rootkit, a remote party can securely
> +identify known bad or unknown software having been loaded into the
> +system.
No; with your current system, it only means I may not place my rootkit
into executable file. I can still place my evil rootkit into shell
script and/or config file.
Pavel
--
teflon -- maybe it is a trademark, but it should not be.
prev parent reply other threads:[~2005-06-17 12:47 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-06-15 14:30 [PATCH] 2 of 5 IMA: documentation patch Reiner Sailer
2005-06-17 12:47 ` Pavel Machek [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20050617124701.GA12863@elf.ucw.cz \
--to=pavel@ucw.cz \
--cc=chrisw@osdl.org \
--cc=emilyr@us.ibm.com \
--cc=greg@kroah.com \
--cc=kylene@us.ibm.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@mail.wirex.com \
--cc=sailer@us.ibm.com \
--cc=sailer@watson.ibm.com \
--cc=toml@us.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox