From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757602Ab3APVxr (ORCPT ); Wed, 16 Jan 2013 16:53:47 -0500 Received: from mx1.redhat.com ([209.132.183.28]:15119 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757429Ab3APVxp (ORCPT ); Wed, 16 Jan 2013 16:53:45 -0500 Date: Wed, 16 Jan 2013 16:53:41 -0500 From: Vivek Goyal To: Mimi Zohar Cc: "Eric W. Biederman" , linux-kernel@vger.kernel.org, pjones@redhat.com, hpa@zytor.com, dhowells@redhat.com, jwboyer@redhat.com, Dmitry Kasatkin , Andrew Morton , linux-security-module@vger.kernel.org Subject: Re: [PATCH 2/3] binfmt_elf: Verify signature of signed elf binary Message-ID: <20130116215341.GA4222@redhat.com> References: <871udloiku.fsf@xmission.com> <1358312159.4593.37.camel@falcor1> <87wqvdli1o.fsf@xmission.com> <1358344859.4593.66.camel@falcor1> <20130116144836.GB29845@redhat.com> <1358350391.4593.112.camel@falcor1> <20130116163453.GD29845@redhat.com> <1358359715.4593.146.camel@falcor1> <20130116182804.GF29845@redhat.com> <1358364290.4593.178.camel@falcor1> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1358364290.4593.178.camel@falcor1> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 16, 2013 at 02:24:50PM -0500, Mimi Zohar wrote: [..] > > > Sorry, this is out of scope for IMA. Dmitry has looked into this, but > > > I'm not sure where it stands at the moment. > > > > Ok, so that's one reason that why I wrote these patcehs. IMA currently > > is not doing following things to make sure address space of signed images > > is not modified by others. > > > > - Protecting against modifications to pages on swap. > > - Protecting against modifications by ptrace. > > - Protecting against modifications which bypassed filesystem and directly > > wrote to the block. > > > > Locking down all the pages of signed binaries in memory hopefully should > > solve above problems. > > Signing and verifying ELF executables goes back a long time ~2003/4, > from a number of esteemed kernel developers, including Greg-KH and Serge > Hallyn. > > IMA-appraisal isn't limited to appraising a single type of file, but is > a generic mechanism for appraising all files. If there are issues that > aren't being addressed, then by all means, please help by addressing > them. Duplicating a large portion of the code is not productive. So do you have ideas on how to address above mentioned issues. Do they fit into the realm of IMA/EVM or I just need to write separate code (which I have already done). With above issues, IMA stuff for executable files sounds incomplete. Thanks Vivek