Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4456264imm; Wed, 30 May 2018 06:05:58 -0700 (PDT) X-Google-Smtp-Source: ADUXVKINX9ruLucY4/4K2u1uVE2uiEy7x1uxrNkw3a3F6aiZsDJvtETPz/BIu8FVm4efqYkBxAeC X-Received: by 2002:a63:648:: with SMTP id 69-v6mr2193974pgg.205.1527685557984; Wed, 30 May 2018 06:05:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527685557; cv=none; d=google.com; s=arc-20160816; b=Z+73Icq+mNOjSKHq/KIkNfejFa6pbapGEM49tjYsA6upYsNWqA9VKuWn51SGzTKNMs LW5cFxTaMVIPgDCvfFTS/KK1wfkn9MI7ZeKOTucDBrvPhtMEwCh79nDAqGDZBSJ8VQuV tDNR4nL87QsUP9SKLgQ2kf1rBlnidVdu9uUf6qFkDdXT/R7HfcBHETZxjuspQJctxB36 0ZoEnXuj0RjHndd1KZ5+qJDAYRaEKSCpIJkx8JW8D/EFC1UiYUPdTxnUcUdYsoB7NwRP dngmBRS4ZnAXBPzd3l0rwih+ue+SPVVyqYGkgoRWLhowjiFMada9Zb/+K8jJ35XcoOUG E+cg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=2jmPm+OQmFtRO4223qUM6Udu/vRzetoRg+L/XJeLLQ4=; b=EGO4Xh4q+Mc9OqHPKENIA+/OxdBj6vJsAs9R/k/dqxOysyUTyudox+0WH/hDOavgjR mfUkbwLJDeopSCfzbPg1EclAbvVd8eeaHEbA6WdWLFh+0M8uZGSpxJp/WGwchWu1fDnq 3nUFXvYJr99YaEiwzyrfRKMOx/AaXx8r+TCc4IiBH/Y6aBQtYWXwTb5yrVUtteMS3bAf dW/kQNdZifVZ4kwruf9FXy8BZzUrR/zAydo5Ndt4nSSv80HqPYCeBKSOEdU+4j/ZREx/ 31lE4izVaMY8qBS+UV8RQoLRIq+XgkbwEpCawyByEySig6U2KcyI4KKU9716fjoYNzO4 Q+nw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p8-v6si4049495pgs.239.2018.05.30.06.05.42; Wed, 30 May 2018 06:05:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753213AbeE3NFD (ORCPT + 99 others); Wed, 30 May 2018 09:05:03 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:25816 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753025AbeE3NE7 (ORCPT ); Wed, 30 May 2018 09:04:59 -0400 Received: from pps.filterd (m0098417.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w4UCvZVJ018477 for ; Wed, 30 May 2018 09:04:58 -0400 Received: from e06smtp12.uk.ibm.com (e06smtp12.uk.ibm.com [195.75.94.108]) by mx0a-001b2d01.pphosted.com with ESMTP id 2j9u7e4ar3-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 30 May 2018 09:04:58 -0400 Received: from localhost by e06smtp12.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 30 May 2018 14:04:56 +0100 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp12.uk.ibm.com (192.168.101.142) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 30 May 2018 14:04:52 +0100 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w4UD4pdb19333374 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 30 May 2018 13:04:52 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B0649AE059; Wed, 30 May 2018 13:53:57 +0100 (BST) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D00ADAE057; Wed, 30 May 2018 13:53:56 +0100 (BST) Received: from localhost.localdomain (unknown [9.80.88.36]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 30 May 2018 13:53:56 +0100 (BST) Subject: Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits From: Mimi Zohar To: Paul Moore , Steve Grubb , Stefan Berger Cc: linux-integrity@vger.kernel.org, linux-audit@redhat.com, linux-kernel@vger.kernel.org Date: Wed, 30 May 2018 09:04:40 -0400 In-Reply-To: <1527634686.3534.27.camel@linux.vnet.ibm.com> References: <20180524201105.3179904-1-stefanb@linux.vnet.ibm.com> <20180524201105.3179904-6-stefanb@linux.vnet.ibm.com> <4331521.GQBdaJNAj6@x2> <1527634686.3534.27.camel@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18053013-0008-0000-0000-000004FC9505 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18053013-0009-0000-0000-00001E90B846 Message-Id: <1527685480.3534.54.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-30_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1805300148 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2018-05-29 at 18:58 -0400, Mimi Zohar wrote: > On Tue, 2018-05-29 at 17:47 -0400, Paul Moore wrote: > > On Tue, May 29, 2018 at 5:35 PM, Steve Grubb wrote: > > > On Tuesday, May 29, 2018 5:19:39 PM EDT Paul Moore wrote: > > >> On Thu, May 24, 2018 at 4:11 PM, Stefan Berger > > >> > > >> wrote: > > >> > Use the new public audit functions to add the exe= and tty= > > >> > parts to the integrity audit records. We place them before > > >> > res=. > > >> > > > >> > Signed-off-by: Stefan Berger > > >> > Suggested-by: Steve Grubb > > >> > --- > > >> > > > >> > security/integrity/integrity_audit.c | 2 ++ > > >> > 1 file changed, 2 insertions(+) > > >> > > > >> > diff --git a/security/integrity/integrity_audit.c > > >> > b/security/integrity/integrity_audit.c index db30763d5525..8d25d3c4dcca > > >> > 100644 > > >> > --- a/security/integrity/integrity_audit.c > > >> > +++ b/security/integrity/integrity_audit.c > > >> > @@ -56,6 +56,8 @@ void integrity_audit_msg(int audit_msgno, struct inode > > >> > *inode,> > > >> > audit_log_untrustedstring(ab, inode->i_sb->s_id); > > >> > audit_log_format(ab, " ino=%lu", inode->i_ino); > > >> > > > >> > } > > >> > > > >> > + audit_log_d_path_exe(ab, current->mm); > > >> > + audit_log_tty(ab, current); > > >> > > >> NACK > > >> > > >> Please add the new fields to the end of the audit record, thank you. > > > > > > Let's see what an example event looks like before NACK'ing this. Way back in > > > 2013 the IMA events were good. I think this is repairing the event after some > > > drift. > > > > Can you reference a specific commit, or point in time during 2013? > > Looking at the git log quickly, if I go back to commit d726d8d719b6 > > ("integrity: move integrity_audit_msg()") from March 18, 2013 (the > > commit that created integrity_audit.c) the field ordering appears to > > be the same as it today. > > > > My NACK still stands. > > There hasn't been any changes up to now.  This patch set refactors > integrity_audit_msg(), creating integrity_audit_msg_common(), which > will be called from both ima_audit_measurement() and > ima_parse_rule(). That should have been "from integrity_audit_msg() and ima_parse_rule()", not ima_audit_measurement(). > Previously the audit record generated by ima_parse_rule() did not > include this info.  The change in this patch will affect both the > existing and the new INTEGRITY_AUDIT_POLICY_RULE audit records.