Received: by 10.213.65.68 with SMTP id h4csp515606imn; Fri, 16 Mar 2018 10:06:27 -0700 (PDT) X-Google-Smtp-Source: AG47ELu36E5X8S+432dPgKCvThUA111jpuWIavisnhD4Tpc0PlLBaofN4rJTKzFE2HeP0yY0ozOJ X-Received: by 10.99.122.28 with SMTP id v28mr2059204pgc.128.1521219987891; Fri, 16 Mar 2018 10:06:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521219987; cv=none; d=google.com; s=arc-20160816; b=RxAQAFCpJMz/KOxXyarGLyvBfXD4wIwH2Y2Qm4f1cDMwwlHmf1d3cvGrYilYNdc8JO ZTEVJiLZq3cLCeCEF5rFCRNGYOx9I7HYaR5Zmjsdw5YyASqGFq2O4MPZqLrdLbhyS4Pw kjCuq8bTweuT525CEbwp05SmB/exYYPd6m9XGr6jxDwWB1Q55QfAzVvoZQqltX3Xa+hf jB34nUgDY1veWwfZT0gZf/6DzlGL1vEcNCdhBMNbVbH0Rao6Y2U3IxFbyrJw2VQd9uF6 V1WKjvWS+SnWm0aYtwsPvuovYzrAfVMDc2BBWK/1qfdAzQoDkwFkmzP7e/bB3EZ4Vwzv IJiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:from:cc:references:to :subject:arc-authentication-results; bh=ccEP1PAcB2attruAltl8Zw5lI/LNLz6EsJTD4t5PGWM=; b=lN7kJBrRCfR5GJYyGZR4DFHWFCtpyzCUM5+kpUoTJc1NUO/wZXJ4vGH56VkDCskILt WZQaC184c52pwAyS4zWKd1IGbGKZunRCqxIgBKET04KaGYqvvXXO3qy/SA6L4l+bBnRS VS2/+EBORKiSHf1C+M7T+F0tjrFMYy0qgo3oquT+H17j/ATcOxN8E+p/bjqEil6S4dB4 TIJsGTarIaP++FEEKQkzaWUakKpgD1CkTmWLZcfypSnrSq0URPWl5ZdAb63ufW6ebqYX 8VQZxej2mnjogncsJBZEYGGFr1JXLF88HS0pGlxSn+bVzDWa99sTHSTTg+/8EY2S2qZe v3MA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q90si4699242pfi.163.2018.03.16.10.06.13; Fri, 16 Mar 2018 10:06:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753763AbeCPRE2 (ORCPT + 99 others); Fri, 16 Mar 2018 13:04:28 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:38538 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753649AbeCPREW (ORCPT ); Fri, 16 Mar 2018 13:04:22 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w2GH3dvL140330 for ; Fri, 16 Mar 2018 13:04:21 -0400 Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by mx0a-001b2d01.pphosted.com with ESMTP id 2grdtbbc7d-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Fri, 16 Mar 2018 13:04:21 -0400 Received: from localhost by e36.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 16 Mar 2018 11:04:20 -0600 Received: from b03cxnp08027.gho.boulder.ibm.com (9.17.130.19) by e36.co.us.ibm.com (192.168.1.136) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Fri, 16 Mar 2018 11:04:17 -0600 Received: from b03ledav004.gho.boulder.ibm.com (b03ledav004.gho.boulder.ibm.com [9.17.130.235]) by b03cxnp08027.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w2GH4HtH8913330; Fri, 16 Mar 2018 10:04:17 -0700 Received: from b03ledav004.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 33AFA78037; Fri, 16 Mar 2018 11:04:17 -0600 (MDT) Received: from sbct-3.pok.ibm.com (unknown [9.47.158.153]) by b03ledav004.gho.boulder.ibm.com (Postfix) with ESMTP id 6593178047; Fri, 16 Mar 2018 11:04:16 -0600 (MDT) Subject: Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support To: James Bottomley , "Eric W. Biederman" References: <20180309201421.6150-1-stefanb@linux.vnet.ibm.com> <20180309201421.6150-2-stefanb@linux.vnet.ibm.com> <87vadxfwqj.fsf@xmission.com> <1521135192.5348.64.camel@HansenPartnership.com> <2183a3b4-6270-d2e9-70ad-a7399eb1681c@linux.vnet.ibm.com> <1521139535.5348.89.camel@HansenPartnership.com> <0dc5b856-8dc6-7b5a-eeac-febd19f6498c@linux.vnet.ibm.com> <1521140467.5348.94.camel@HansenPartnership.com> <056e5b9e-b4d3-1862-baea-06dda4bd0713@linux.vnet.ibm.com> Cc: mkayaalp@cs.binghamton.edu, Mehmet Kayaalp , sunyuqiong1988@gmail.com, containers@lists.linux-foundation.org, linux-kernel@vger.kernel.org, david.safford@ge.com, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, zohar@linux.vnet.ibm.com From: Stefan Berger Date: Fri, 16 Mar 2018 13:04:16 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <056e5b9e-b4d3-1862-baea-06dda4bd0713@linux.vnet.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18031617-0020-0000-0000-00000D99B3DE X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00008685; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000254; SDB=6.01003957; UDB=6.00510977; IPR=6.00783246; MB=3.00020076; MTD=3.00000008; XFM=3.00000015; UTC=2018-03-16 17:04:20 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18031617-0021-0000-0000-0000608540B9 Message-Id: <7e015d3c-4fab-3d69-711b-2ebbad07018f@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-03-16_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1803160206 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/15/2018 03:15 PM, Stefan Berger wrote: > On 03/15/2018 03:01 PM, James Bottomley wrote: >> On Thu, 2018-03-15 at 14:51 -0400, Stefan Berger wrote: >>> On 03/15/2018 02:45 PM, James Bottomley wrote: >> [...] >>>>>> going to need some type of keyring namespace and there's >>>>>> already >>>>>> one hanging off the user_ns: >>>>>> >>>>>> commit f36f8c75ae2e7d4da34f4c908cebdb4aa42c977e >>>>>> Author: David Howells >>>>>> Date: Tue Sep 24 10:35:19 2013 +0100 >>>>>> >>>>>> KEYS: Add per-user_namespace registers for persistent >>>>>> per-UID >>>>>> kerberos caches >>>>> The benefit for IMA would be that this would then tie the keys >>>>> needed for appraising to the IMA namespace's policy. >>>>> However, if you have an appraise policy in your IMA namespace, >>>>> which is now hooked to the user namespace, and you join that user >>>>> namespace but your files don't have signatures, nothing will >>>>> execute anymore. That's now a side effect of joining this user >>>>> namespace unless we have a magic exception. My feeling is, >>>>> people may not like that... >>>> Agree, but I think the magic might be to populate the ima keyring >>>> with the parent on user_ns creation. That way the user_ns owner >>>> can delete the parent keys if they don't like them, but by default >>>> the parent appraisal policy should just work. >>> That may add keys to your keyring but doesn't get you signatures on >>> your files. >> But it doesn't need to. The only way we'd get a failure is if the file >> is already being appraised and we lose access to the key. If the > > Well, the configuration I talked about above was assuming that we have > an appraisal policy active in the IMA namespace, which is now tied to > the user namespace that was just joined. > > If we are fine with the side effects of an IMA policy active as part > of a user namespace then let's go with it. The side effects in case of > an active IMA appraisal may then be that files cannot be > read/accessed, or file measurements or IMA auditing may occur. > > The alternative is we have an independent IMA namespace. If one joins > the USER namespace and there are no IMA-related side effects. If one > joins the IMA namespace its IMA policy should start being enforced. If > the current active USER namespace has the keys that go with the > signatures of the filesystem, then we're fine from the appraisal > perspective. If not, then IMA namespace joining may prevent file > accesses. With these differences pointed out, which path do we want to go now ? Eric ? James ? Stefan