lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1386334640-31393-1-git-send-email-roberto.sassu@polito.it>
Date:	Fri,  6 Dec 2013 13:57:14 +0100
From:	Roberto Sassu <roberto.sassu@...ito.it>
To:	jmorris@...ei.org, zohar@...ux.vnet.ibm.com
Cc:	d.kasatkin@...sung.com, linux-security-module@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	linux-ima-devel@...ts.sourceforge.net,
	Roberto Sassu <roberto.sassu@...ito.it>
Subject: [PATCH-v2 0/3] ima: add support for custom template formats

Hi everyone

currently accepted patches for the new template management mechanism allow to
choose among a list of supported templates, statically defined in the code.
This functionality is not flexible enough as users may want to include
in their measurements list only information needed and not use predefined
combinations.

For this reason, this patch set introduces the new kernel command line parameter
'ima_template_fmt' to specify a custom template format at boot time,
i.e. a string of template fields identifiers concatenated with the '|'
separator character. The complete list of defined template fields can be
found in Documentation/security/IMA-templates.txt.

The format string is checked at the very beginning in the setup function
ima_template_fmt_setup() so that, if it is wrong, IMA can go back to the
default template, selected through a kernel configuration option.

To allow userspace tools parse a measurements list with a custom format, IMA
provides as template name the same format string provided by users at boot
time, so that tools know which information are included in a entry and extract
them if they can handle listed template fields.


Changelog:
 - patch 2/3: fixed patch description (Roberto Sassu, suggested by Mimi Zohar)
 - patch 3/3: set 'template_name' variable in ima_fs.c only once
   (Roberto Sassu, suggested by Mimi Zohar)
 - patch 3/3: simplified code of ima_template_fmt_setup()
   (Roberto Sassu, suggested by Mimi Zohar)
 - the patch 'ima: make a copy of template_fmt in template_desc_init_fields()'
   has been removed from this version of the patch set since it has been already
   merged in the mainline kernel (commit: dbc335d2d + fix: af91706d5)

Roberto Sassu


Roberto Sassu (3):
  ima: added error messages to template-related functions
  ima: display template format in meas. list if template name length is
    zero
  ima: added support for new kernel cmdline parameter ima_template_fmt

 Documentation/kernel-parameters.txt      |  4 +++
 Documentation/security/IMA-templates.txt | 29 ++++++++---------
 security/integrity/ima/ima_fs.c          | 16 +++++++---
 security/integrity/ima/ima_template.c    | 55 ++++++++++++++++++++++++++++++--
 4 files changed, 83 insertions(+), 21 deletions(-)

-- 
1.8.1.4


Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (2061 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ