Received: by 10.213.65.68 with SMTP id h4csp47966imn; Mon, 12 Mar 2018 17:08:06 -0700 (PDT) X-Google-Smtp-Source: AG47ELua0T6Walp5xcrGycJ6kp52FoTWedA3LvVJxZ3uoMFIfv/Ic+oF8tG1+OFA61jeSBcQICQQ X-Received: by 2002:a17:902:d81:: with SMTP id 1-v6mr9665553plv.324.1520899686048; Mon, 12 Mar 2018 17:08:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520899686; cv=none; d=google.com; s=arc-20160816; b=c+M78/9YO426ZJ5HhvY8RXQ2RJHwBBzikwMbouEFfkvIn2QjWSE19ts26AKj1Pi7Y6 Xz7dry8RGRRMNUYWMRCMQIO4AsL7Uez/wvsmmenFE2uIXE9osS8e0XC6iu4gcIB58fgr zlV9Zkl2fiKvPmDdr7EvnFUkIDGFNR06dvnOz6Bru5dhgnDKIs7Hwxpb1dABzkHw4NK1 i0bJWPjLXgY31A1UnywXXNrbxdT548U3tzIxvijHqrhQu12/XJ9HGPvKuIa3PA25hFZ9 bSXJGwaJpNxG1P1BhocrPwqmChaMk0rgOsZG2wVb91N1+6LBYpoJYwXFe1BpgvVH0Vrz knxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature:arc-authentication-results; bh=D3kBiqANYKeM0u+c10OFJ3uTT0G5y2Y2UFlMEb9rwBQ=; b=Zg9hT3V14yzrUTeEHYM2Z1W2Ov4nMVn9yrbeIwvL4xMYdjXykv5QMMpL075iXVdShA qaNqs8BDIeZl2wVK647BLKHAlhnlrVV4F1iGBHdXM43YhjKSoJCBYmamT44xN2Cx7dJv zIV8AVahKCvNu94vNpnKfFWZ+Sl8huGzZHYaD3noqCzKa2e7VFjhpAf7dERnix8kNmq2 HwOwJHf8lPSEZYWlw1Du+VrGdQ6XuTR8b7i5FBu4KGJ0gwntX2jvkBP2gjj5dcmdv2vB 0EfImQGmDrtDXyuVC1qagmoUj48dHHGGof6WPxh7nTbyYIXS6hsxVUFuclMBU3zVY7Qb 4Vag== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=TgzsdLcI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h14si6583487pfd.404.2018.03.12.17.07.50; Mon, 12 Mar 2018 17:08:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=TgzsdLcI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751588AbeCMAGu (ORCPT + 99 others); Mon, 12 Mar 2018 20:06:50 -0400 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:48638 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751333AbeCMAGs (ORCPT ); Mon, 12 Mar 2018 20:06:48 -0400 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id DBDD48EE139; Mon, 12 Mar 2018 17:06:47 -0700 (PDT) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1TP8mdwSp3YR; Mon, 12 Mar 2018 17:06:47 -0700 (PDT) Received: from [153.66.254.194] (unknown [50.35.65.221]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 29FA38EE104; Mon, 12 Mar 2018 17:06:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1520899607; bh=zofgnSxtIHSOJg6s93D7fMtXtYICU9SJFR4UXAIOTVg=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=TgzsdLcIpmtCvr0cv9pJa5S1t+jZVGJMZ9e6bvFSPo61ohsTMcN2MhncCtfK2N8mo yju5bY6AaIG2n8/FOKwrG4s+lsGNTgmtHIl6Se+ODJf75z2LyMO+0OfjIUx7SSvzTF t4KL/d3+hA6k6/r6i4waDtL6npzSHIzKHh5GlX/o= Message-ID: <1520899605.4522.67.camel@HansenPartnership.com> Subject: Re: [PATCH] security: Fix IMA Kconfig for dependencies on ARM64 From: James Bottomley To: Mimi Zohar , Jiandi An , Jason Gunthorpe Cc: dmitry.kasatkin@gmail.com, jmorris@namei.org, serge@hallyn.com, linux-integrity@vger.kernel.org, linux-ima-devel@lists.sourceforge.net, linux-ima-user@lists.sourceforge.net, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, David Safford Date: Mon, 12 Mar 2018 17:06:45 -0700 In-Reply-To: <1520897400.3547.253.camel@linux.vnet.ibm.com> References: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> <20180307185132.GA30102@ziepe.ca> <1520448953.10396.565.camel@linux.vnet.ibm.com> <1520449719.5558.28.camel@HansenPartnership.com> <1520450495.10396.587.camel@linux.vnet.ibm.com> <1520451662.24314.5.camel@HansenPartnership.com> <1520461156.10396.654.camel@linux.vnet.ibm.com> <191cfd49-0c66-a5ef-3d2b-b6c4132aa294@codeaurora.org> <1520615461.12216.6.camel@HansenPartnership.com> <1520891598.3547.190.camel@linux.vnet.ibm.com> <1520893847.4522.62.camel@HansenPartnership.com> <1520897400.3547.253.camel@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-03-12 at 19:30 -0400, Mimi Zohar wrote: > On Mon, 2018-03-12 at 15:30 -0700, James Bottomley wrote: > > > > On Mon, 2018-03-12 at 17:53 -0400, Mimi Zohar wrote: > [...] > > > > > > > > - This use case, when the TPM is not builtin and unavailable > > > before > > > IMA is initialized. > > > > > > I would classify this use case as an IMA testing/debugging > > > environment, when it cannot, for whatever reason, be builtin the > > > kernel or initialized before IMA. > > > > > > From Dave Safford: > > >     For the TCG chain of trust to have any meaning, all files > > > have to > > >     be measured and extended into the TPM before they are > > > accessed. > > > If > > >     the TPM driver is loaded after any unmeasured file, the chain > > > is > > >     broken, and IMA is useless for any use case or any threat > > > model. > > > > I don't think this is quite the correct characterisation.  In > > principle the kernel could also touch the files before IMA is > > loaded.  However, we know from the way the kernel operates that it > > doesn't.  We basically trust that the kernel measurement tells us > > this.  The same thing can be made to apply to the initrd. > > With the builtin "tcb" policy, IMA-measurement is enabled from the > very beginning.  Afterwards, the system can transition to a custom > policy based on finer grain LSM labels, which aren't available on > boot. > > > > > The key question is not whether the component could theoretically > > access the files but whether it actually does so. > > As much as you might think you know what is included in the > initramfs, IMA-measurement is your safety net, including everything > accessed in the TCB. The initrd *is* part of the Trusted Computing Base because it's part of the boot custody chain.  That's really my point.  If I don't know what's in my initrd, I've broken the chain there and IMA can't fix it. James