Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753125AbdHBLXa (ORCPT ); Wed, 2 Aug 2017 07:23:30 -0400 Received: from lhrrgout.huawei.com ([194.213.3.17]:32501 "EHLO lhrrgout.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751890AbdHBLX1 (ORCPT ); Wed, 2 Aug 2017 07:23:27 -0400 Subject: Re: [Linux-ima-devel] [PATCH, RESEND 08/12] ima: added parser for RPM data type To: James Morris References: <20170725154423.24845-9-roberto.sassu@huawei.com> <20170801102036.15371-1-roberto.sassu@huawei.com> <20170801102709.GA24285@infradead.org> <11206fd8-d189-deb0-ab67-aec373f8d979@huawei.com> CC: Christoph Hellwig , , , , , , From: Roberto Sassu Message-ID: <5de9c4a2-dc96-b916-162a-adafd7da278b@huawei.com> Date: Wed, 2 Aug 2017 13:22:35 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.47.87.144] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090204.5981B60B.0073,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 9354cd68e11f91e2bf3c83e78062900d Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6110 Lines: 147 On 8/2/2017 9:22 AM, James Morris wrote: > On Tue, 1 Aug 2017, Roberto Sassu wrote: > >> On 8/1/2017 12:27 PM, Christoph Hellwig wrote: >>> On Tue, Aug 01, 2017 at 12:20:36PM +0200, Roberto Sassu wrote: >>>> This patch introduces a parser for RPM packages. It extracts the digests >>>> from the RPMTAG_FILEDIGESTS header section and converts them to binary >>>> data >>>> before adding them to the hash table. >>>> >>>> The advantage of this data type is that verifiers can determine who >>>> produced that data, as headers are signed by Linux distributions vendors. >>>> RPM headers signatures can be provided as digest list metadata. >>> >>> Err, parsing arbitrary file formats has no business in the kernel. >> >> The benefit of this choice is that no actions are required for >> Linux distribution vendors to support the solution I'm proposing, >> because they already provide signed digest lists (RPM headers). >> >> Since the proof of loading a digest list is the digest of the >> digest list (included in the list metadata), if RPM headers are >> converted to a different format, remote attestation verifiers >> cannot check the signature. >> >> If the concern is security, it would be possible to prevent unsigned >> RPM headers from being parsed, if the PGP key type is upstreamed >> (adding in CC keyrings@vger.kernel.org). > > It's a security concern and also a layering violation, there should be no > need to parse package file formats in the kernel. > > I'm not really clear on exactly how this patch series works. Can you > provide a more concrete explanation of what steps would occur during boot > and attestation? The main idea of this patch set is that, if a system executes or reads good files (e.g. those from a Linux distribution), the difference between the assertion 'a file could have possibly been accessed' and 'a file has been accessed' is not relevant for verifiers that only check the provenance of software. Then, for those verifiers, a measurement representing the list of good files which could have possibly been accessed gives the same guarantees of individual file measurements. The patch set introduces two data types: - digest list: contains the digests of good files - list metadata: contains the digest, the signature and the path of each digest list to load (why loading many lists instead of one will be clear after I explain the remote attestation verification process) Steps at boot: 1) systemd reads the path of list metadata from /etc/ima/digest-lists and writes it to a new securityfs file created by IMA 2) IMA reads and parses the list metadata (same mechanism for loading a policy, already upstreamed) 3) for each list metadata, IMA reads and parses the digest list and adds the file digests to a hash table 4) when a file is accessed, IMA calculates the digest as before and searches the file digest in the new hash table; if the digest is found, IMA sets the IMA_MEASURED flag in the inode metadata and clears the IMA_MEASURE action Notes: - list metadata and digest lists are measured before IMA reads them - the digest of digest lists is also added to the hash table, otherwise there would be a measurement for each digest list The measurement list looks like: 10