Received: by 10.213.65.16 with SMTP id m16csp70337imf; Sun, 11 Mar 2018 15:59:47 -0700 (PDT) X-Google-Smtp-Source: AG47ELtijJQKuIZDFm2ioeW64rs5BUJ2MByvuO1RQ2LLlIg3oIs7jCEb3hXAPlX4ytPuY5hCGpv4 X-Received: by 10.98.56.131 with SMTP id f125mr5916991pfa.190.1520809187390; Sun, 11 Mar 2018 15:59:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520809187; cv=none; d=google.com; s=arc-20160816; b=oPjVkNqLhD00mrcOAKvmjtDXIXlaVyqydb/0jFFiXJ8yie4fD6sxiyedjdQ7u9NkYk utaT4V80sNdUdSwQlZzEBswN+bk7ynDRynGdWTD8TV3dXhCu+gbiPVN0HJeGuPNu/0c5 e8KFh9k9vndstohQAWAm9bKO1AzdRvCQOvYUbk2szfi7hlvqb9/McW2ij7/C0VZGGH6q WYXIJIophMF3NaZrW8/tiHrsfe1Qv2wLhsliwRs2KeNPZS3gJ8lHC31lCos+kDoOaVaB C2zwEnnwXRtHKwsK5KAmf4mvy1+VzfNcaFjv7shdSJYRdjlrwIs+2epgunX7qJAPuFI9 +09g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=Ankgup0ZuePnQVryad6aSgbNFdJaQTy4BeEdxOuttU8=; b=k8WyBtDW/wq/BcgD6kKUKMYTkLpCYHRvolwrmeJzvn+RcWt2BeLrxN/1yqg8lVUQrk N6wmPCFnAZOlUhE/vMT9hEAnyYedyWmig8MhifjT3GzJWCi+YjqpKdHhE5YEgx5gqL3N IkXONVjd0gXBS9VSv8hoI1nNV8IgXboBiHxfRc5RMFD6AVqZEOTFfUnJxS9A9md7SOqG hX4xu5LPFyZlJ1kutWQTjCQcZxsH0u5okl0qCE63aUNXD3mZ+bp4MTCQLeQ/KCHc9VQK NMCpy2SNEGmBlRQuKJ9BJyT3MCXdegFcpUOCDauE+4O/7cENXP+xMAaNwm+kMG1foaSq vN9g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d6-v6si5161060plm.88.2018.03.11.15.59.30; Sun, 11 Mar 2018 15:59:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932373AbeCKW6e (ORCPT + 99 others); Sun, 11 Mar 2018 18:58:34 -0400 Received: from namei.org ([65.99.196.166]:52586 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932224AbeCKW6c (ORCPT ); Sun, 11 Mar 2018 18:58:32 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w2BMw2RY030034; Sun, 11 Mar 2018 22:58:02 GMT Date: Mon, 12 Mar 2018 09:58:02 +1100 (AEDT) From: James Morris To: Stefan Berger cc: "Serge E. Hallyn" , Mehmet Kayaalp , Mehmet Kayaalp , Yuqiong Sun , containers , linux-kernel , David Safford , James Bottomley , linux-security-module , ima-devel , Yuqiong Sun , Mimi Zohar Subject: Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support In-Reply-To: Message-ID: References: <20170720225033.21298-1-mkayaalp@linux.vnet.ibm.com> <20170720225033.21298-2-mkayaalp@linux.vnet.ibm.com> <20170725175317.GA727@mail.hallyn.com> <1501008554.3689.30.camel@HansenPartnership.com> <20170725190406.GA1883@mail.hallyn.com> <1501009739.3689.33.camel@HansenPartnership.com> <1501012082.27413.17.camel@linux.vnet.ibm.com> <645db815-7773-e351-5db7-89f38cd88c3d@linux.vnet.ibm.com> <20170725204622.GA4969@mail.hallyn.com> <97839865-b0ab-8e5d-114e-0603ef2edf6f@linux.vnet.ibm.com> <20180309025942.GA15295@mail.hallyn.com> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 9 Mar 2018, Stefan Berger wrote: > Yuqiong is publishing a paper in this area. I believe the conference is only > later this year. > > Our goals are to enable IMA measurements, appraisal, and auditing inside a > container using namespaces. This is excellent to have -- can you include this requirements analysis as a file Documentation/security on the next posting? Also, if you need a public space for managing these kinds of documents, consider utilizing http://kernsec.org/wiki/index.php/Linux_Kernel_Integrity - James -- James Morris