From: "Bruno E. O. Meneguele" <brdeoliv@redhat.com>
To: Mimi Zohar <zohar@linux.vnet.ibm.com>
Cc: linux-kernel@vger.kernel.org,
linux-security-module@vger.kernel.org,
linux-integrity@vger.kernel.org, serge@hallyn.com,
james.l.morris@oracle.com, dmitry.kasatkin@gmail.com,
rusty@rustcorp.com.au, jeyu@kernel.org
Subject: Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
Date: Wed, 25 Oct 2017 13:05:44 -0200 [thread overview]
Message-ID: <20171025150544.GC26762@glitch> (raw)
In-Reply-To: <1508885697.3164.5.camel@linux.vnet.ibm.com>
[-- Attachment #1: Type: text/plain, Size: 2608 bytes --]
On 24-10, Mimi Zohar wrote:
> On Tue, 2017-10-24 at 15:37 -0200, Bruno E. O. Meneguele wrote:
> > When the user requests MODULE_CHECK policy and its kernel is compiled
> > with CONFIG_MODULE_SIG_FORCE not set, all modules would not load, just
> > those loaded in initram time. One option the user would have would be
> > set a kernel cmdline param (module.sig_enforce) to true, but the IMA
> > module check code doesn't rely on this value, it checks just
> > CONFIG_MODULE_SIG_FORCE.
> >
> > This patch solves this problem checking for the exported value of
> > module.sig_enforce cmdline param intead of CONFIG_MODULE_SIG_FORCE,
> > which holds the effective value (CONFIG || param).
> >
> > Signed-off-by: Bruno E. O. Meneguele <brdeoliv@redhat.com>
> > ---
> > security/integrity/ima/ima_main.c | 6 +++---
> > 1 file changed, 3 insertions(+), 3 deletions(-)
> >
> > diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
> > index e4ab8ef8016e..d11a7fcc5c8b 100644
> > --- a/security/integrity/ima/ima_main.c
> > +++ b/security/integrity/ima/ima_main.c
> > @@ -356,12 +356,12 @@ void ima_post_path_mknod(struct dentry *dentry)
> > */
> > int ima_read_file(struct file *file, enum kernel_read_file_id read_id)
> > {
> > + bool sig_enforce = is_module_sig_enforced();
> > +
> > if (!file && read_id == READING_MODULE) {
>
> The only reason for getting here is that you're using the old module
> load syscall. Is there a reason for not using the new one, which
> passes the file descriptor?
>
> thanks,
>
> Mimi
>
Basicaly because the way kmod handles compressed (gz/xz) modules. The
way it's today would require major changes in the code or some kind of
memfd_create() + xattrs reassignement in order to finit_module() be used
correctly.
Considering it would take some time to be accepted or even to figure out
the correct way to tackle it, the current IMA module check code works
aside kernel module signature validation, which is fine for now for me,
but has the problem that this patch tries to solve in the
CONFIG_MODULE_SIG_FORCE check (ignoring module.sig_enforce cmdline
param).
> > -#ifndef CONFIG_MODULE_SIG_FORCE
> > - if ((ima_appraise & IMA_APPRAISE_MODULES) &&
> > + if (!sig_enforce && (ima_appraise & IMA_APPRAISE_MODULES) &&
> > (ima_appraise & IMA_APPRAISE_ENFORCE))
> > return -EACCES; /* INTEGRITY_UNKNOWN */
> > -#endif
> > return 0; /* We rely on module signature checking */
> > }
> > return 0;
>
>
--
bmeneg
PGP Key: http://bmeneg.com/pubkey.txt
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]
next prev parent reply other threads:[~2017-10-25 15:05 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-24 17:36 [PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy Bruno E. O. Meneguele
2017-10-24 17:37 ` [PATCH v3 1/2] module: export module signature enforcement status Bruno E. O. Meneguele
2017-10-24 17:37 ` [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG Bruno E. O. Meneguele
2017-10-24 22:54 ` Mimi Zohar
2017-10-25 15:05 ` Bruno E. O. Meneguele [this message]
2017-10-25 17:18 ` Mimi Zohar
2017-10-25 18:08 ` Bruno E. O. Meneguele
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171025150544.GC26762@glitch \
--to=brdeoliv@redhat.com \
--cc=dmitry.kasatkin@gmail.com \
--cc=james.l.morris@oracle.com \
--cc=jeyu@kernel.org \
--cc=linux-integrity@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=rusty@rustcorp.com.au \
--cc=serge@hallyn.com \
--cc=zohar@linux.vnet.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox