Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4683335imm; Fri, 18 May 2018 08:59:59 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpGgpgUUk+4MfQBcEhFkyxEHnhS/uhJ/j0Y4Q8rFl6T3g1LtZRiI2vSbuRnjt2peSO7bsQK X-Received: by 2002:a62:22db:: with SMTP id p88-v6mr10006119pfj.239.1526659199908; Fri, 18 May 2018 08:59:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526659199; cv=none; d=google.com; s=arc-20160816; b=mIGpFeW3IHvTBtEFFPSe4t7TH9oOBUAoSkaNLT8zRHpjOmzmX5wS1cRMFr/11D4jPK ROOkovirF46mxr6GCUX4OKC1Q+JaJ/QWY2hcw2kO84rn/1TPRluzO2/3GhuU+Jj4sxrW d8SBW0awIfPslT4dTEecnTqS00BkdHy1/oyU9uUGOK8XhHyaCt/E3HAI/4rx567we9al CKX8FcFQM0h73Ws2zZDDkrY8UaC1o+C86RJR+QNVPQabQ8V5exDnR599fPDdezUp+lyl nYpIWn77PPTDCqRV/0PGdrBHqztV44VXthfbrbdMFvXQuersHjTUTA4NiM3hbhPAwENv 3rrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=6bBTbzQZLlPMlSryDcXIn5P2C8yf52WRqbfpLV3Xm+Q=; b=wgZdTybbcb8deu1qo/Hvu9tbT/wCj+HkM8uIFnXUw6nxwSxFvUxeYY1FpCSlK0MWj/ vpmXrewVe3CLJNXswkVICM00I2JYR/knO+U/uaKo3esVFADA+nL9sxcbIG47MfgKOeCP Yb/Jlmzp9aY4h3Bjp9GbvBkANiVtXFQ4vdoKNtHbp6fwC+SesxYzFCx60T+RNe1fVZJ5 UkVIN6ndtLaXCA7IYbYvPq/aj0P6uSxQAcqYi43R1QS/t0Oj7X/gJyBMOrCGd3a2mXjW KBJ/OGy6saYtKX5GsD2Mo3dk1IwhEEr3mGPD0qPwGjp8kG3MYA0o74EVIpktkIGq8OqP rl0w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w8-v6si6073650pgr.111.2018.05.18.08.59.45; Fri, 18 May 2018 08:59:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752373AbeERP5i (ORCPT + 99 others); Fri, 18 May 2018 11:57:38 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:39742 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752221AbeERP5g (ORCPT ); Fri, 18 May 2018 11:57:36 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 4DA91BB40A; Fri, 18 May 2018 15:57:36 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-24.rdu2.redhat.com [10.10.112.24]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 82B5A2026980; Fri, 18 May 2018 15:57:34 +0000 (UTC) Date: Fri, 18 May 2018 11:56:59 -0400 From: Richard Guy Briggs To: Mimi Zohar Cc: Stefan Berger , containers@lists.linux-foundation.org, Linux-Audit Mailing List , linux-integrity , LKML , paul@paul-moore.com, sgrubb@redhat.com Subject: Re: [PATCH] audit: add containerid support for IMA-audit Message-ID: <20180518155659.porewd6moctumkys@madcap2.tricolour.ca> References: <1520257393.10396.291.camel@linux.vnet.ibm.com> <20180305135008.po6lheqnmkqqo6q4@madcap2.tricolour.ca> <1520259854.10396.313.camel@linux.vnet.ibm.com> <20180308112104.z67wohdvjqemy7wy@madcap2.tricolour.ca> <20180517213001.62caslkjwv575xgl@madcap2.tricolour.ca> <86df5c2c-9db3-21b9-b91b-30a4f53f9504@linux.vnet.ibm.com> <1526647996.3632.164.camel@linux.vnet.ibm.com> <1526654395.3632.196.camel@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1526654395.3632.196.camel@linux.vnet.ibm.com> User-Agent: NeoMutt/20171027 X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Fri, 18 May 2018 15:57:36 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Fri, 18 May 2018 15:57:36 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'rgb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-05-18 10:39, Mimi Zohar wrote: > On Fri, 2018-05-18 at 09:54 -0400, Stefan Berger wrote: > > On 05/18/2018 08:53 AM, Mimi Zohar wrote: > > [..] > > > >>>> If so, which ones? We could probably refactor the current > > >>>> integrity_audit_message() and have ima_parse_rule() call into it to get > > >>>> those fields as well. I suppose adding new fields to it wouldn't be > > >>>> considered breaking user space? > > >>> Changing the order of existing fields or inserting fields could break > > >>> stuff and is strongly discouraged without a good reason, but appending > > >>> fields is usually the right way to add information. > > >>> > > >>> There are exceptions, and in this case, I'd pick the "more standard" of > > >>> the formats for AUDIT_INTEGRITY_RULE (ima_audit_measurement?) and stick > > >>> with that, abandoning the other format, renaming the less standard > > >>> version of the record (ima_parse_rule?) and perhpas adopting that > > >>> abandonned format for the new record type while using > > >>> current->audit_context. > > > This sounds right, other than "type=INTEGRITY_RULE" (1805) for > > > ima_audit_measurement(). ?Could we rename type=1805 to be > > > > So do we want to change both? I thought that what > > ima_audit_measurement() produces looks ok but may not have a good name > > for the 'type'. Now in this case I would not want to 'break user space'. > > The only change I was going to make was to what ima_parse_rule() produces. > > The only change for now is separating the IMA policy rules from the > IMA-audit messages. > > Richard, when the containerid is appended to the IMA-audit messages, > would we make the audit type name change then? No, go ahead and make the change now. I'm expecting that the containerid record will just be another auxiliary record and should not affect you folks. > > > INTEGRITY_AUDIT or INTEGRITY_IMA_AUDIT? ?The new type=1806 audit > > > message could be named INTEGRITY_RULE or, if that would be confusing, > > > INTEGRITY_POLICY_RULE. > > > > For 1806, as we would use it in ima_parse_rule(), we could change that > > in your patch to INTEGRITY_POLICY_RULE. IMA_POLICY_RULE may be better > > for IMA to produce but that's inconsistent then. > > Ok > > > > > > > > >> 1806 would be in sync with INTEGRITY_RULE now for process related info. > > >> If this looks good, I'll remove the dependency on your local context > > >> creation and post the series. > > >> > > >> The justification for the change is that the INTEGRITY_RULE, as produced > > >> by ima_parse_rule(), is broken. > > > Post which series? ?The IMA namespacing patch set? ?This change should > > > be upstreamed independently of IMA namespacing. > > > > Without Richard's local context patch it may just be one or two patches. > > Richard, if we separate the ima_parse_rules() audit messages, changing > the audit rule number now, without the call to audit_log_task_info(), > would adding the call later be breaking userspace? Userspace is arguably already broken due to two formats and one usage that isn't an auxiliary record. All that should be necessary for now is to use a different record number and pass it current->audit_context instead of NULL. > Mimi - RGB -- Richard Guy Briggs Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada IRC: rgb, SunRaycer Voice: +1.647.777.2635, Internal: (81) 32635