[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1588864628.5685.78.camel@linux.ibm.com>
Date: Thu, 07 May 2020 11:17:08 -0400
From: Mimi Zohar <zohar@...ux.ibm.com>
To: Roberto Sassu <roberto.sassu@...wei.com>,
"david.safford@...il.com" <david.safford@...il.com>,
"viro@...iv.linux.org.uk" <viro@...iv.linux.org.uk>,
"jmorris@...ei.org" <jmorris@...ei.org>,
John Johansen <john.johansen@...onical.com>
Cc: "linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org>,
"linux-integrity@...r.kernel.org" <linux-integrity@...r.kernel.org>,
"linux-security-module@...r.kernel.org"
<linux-security-module@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
Silviu Vlasceanu <Silviu.Vlasceanu@...wei.com>
Subject: Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
On Thu, 2020-05-07 at 07:53 +0000, Roberto Sassu wrote:
> > -----Original Message-----
> > From: Mimi Zohar [mailto:zohar@...ux.ibm.com]
> > Sent: Wednesday, May 6, 2020 11:10 PM
> > To: Roberto Sassu <roberto.sassu@...wei.com>; david.safford@...il.com;
> > viro@...iv.linux.org.uk; jmorris@...ei.org; John Johansen
> > <john.johansen@...onical.com>
> > Cc: linux-fsdevel@...r.kernel.org; linux-integrity@...r.kernel.org; linux-
> > security-module@...r.kernel.org; linux-kernel@...r.kernel.org; Silviu
> > Vlasceanu <Silviu.Vlasceanu@...wei.com>
> > Subject: Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
Roberto, please fix your mailer or at least manually remove this sort
of info from the email.
> >
> > On Wed, 2020-05-06 at 15:44 -0400, Mimi Zohar wrote:
> > > Since copying the EVM HMAC or original signature isn't applicable, I
> > > would prefer exploring an EVM portable and immutable signature only
> > > solution.
> >
> > To prevent copying the EVM xattr, we added "security.evm" to
> > /etc/xattr.conf. To support copying just the EVM portable and
> > immutable signatures will require a different solution.
>
> This patch set removes the need for ignoring security.evm. It can be always
> copied, even if it is an HMAC. EVM will update it only when verification in
> the pre hook is successful. Combined with the ability of protecting a subset
> of files without introducing an EVM policy, these advantages seem to
> outweigh the effort necessary to make the switch.
As the EVM file HMAC and original signature contain inode specific
information (eg. i_version, i_generation), these xattrs cannot ever be
copied. The proposed change is in order to support just the new EVM
signatures.
At least IMA file hashes should always be used in conjunction with
EVM. EVM xattrs should always require a security.ima xattr to bind
the file metadata to the file data. The IMA and EVM policies really
need to be in sync.
Mimi
Powered by blists - more mailing lists