Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp293715img; Wed, 27 Mar 2019 23:17:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqzY87a0kZuBSHSeky+nGmz3F8DqGcEbrTmm7H8TypH+FdhuTx1GMEmZ/doZPM3h6msgxpQP X-Received: by 2002:aa7:90ca:: with SMTP id k10mr20549497pfk.144.1553753863403; Wed, 27 Mar 2019 23:17:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553753863; cv=none; d=google.com; s=arc-20160816; b=ZkJPEHkJtZss7GSwf1M87U6G9ks/cuUbE3vKqq1byptoCqYbVjFvEoOxhkMplA8O8S 6KDF6wi0gwUnVsg358AjhnyFaRe6k5LXSwZ7LTw8xP7B/3YBGr6iQp8IuseSsgHkrFAh O55FcqgT9YVTioS+Ix/b1TlZIUP2v2mCQHxjTI0LJ78rticHyFGV5WRhxjI1dIZt5BDw l+OpiCalAp+ARJxLje6c7bsufY2j/r5p8rpSLa0on0Prmhi1BT+/FQcYBfsystIlw3U7 rAXOr0xg5XvCrEIGtCwxQL1BGJnYxeNI0biVSVXR6ef7qp94bu6Yekevauu49XOn353Q slHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date; bh=tKKgyh5Yo1GA+UtdrvUFd+Y2AVZ/ZlZOni1D9V5hDxo=; b=LFJtKwKYVkDlg9G0CNJS2yEES4YC+qPNyjkmqbOpNkb19q7e19j0rSYBjDyoHPqKx4 kc6V01su4vy695vXu4hR9biNKS3QcLJQKPGeKv42uW9Q8rESxOHSYUfS+aj3SPiPTSuu kvQzd9MleIQ++izjkj7Qjmt7/UkXSI+p6chTo1n9nWfuTzNh3Bkots8DhfjUQ34lz78L ADVQp85IaGJ9pmtV327GAnfRH6f502ul39b5NBTP6zHokqC7z8Ca3HakNjjCjtA7AZLy orRmpIMTAb4PiJ8om6vHSeysKl4fV6/ukSixnZmLeu0ElWKpEH6iM9zsusbfkrZEOwNc 4UMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f7si6653154pgs.316.2019.03.27.23.17.27; Wed, 27 Mar 2019 23:17:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726250AbfC1GQw (ORCPT + 99 others); Thu, 28 Mar 2019 02:16:52 -0400 Received: from vmicros1.altlinux.org ([194.107.17.57]:52468 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725765AbfC1GQw (ORCPT ); Thu, 28 Mar 2019 02:16:52 -0400 Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id CD4BE72CC64; Thu, 28 Mar 2019 09:16:48 +0300 (MSK) Received: from altlinux.org (sole.flsd.net [185.75.180.6]) by imap.altlinux.org (Postfix) with ESMTPSA id B19954A4AE9; Thu, 28 Mar 2019 09:16:48 +0300 (MSK) Date: Thu, 28 Mar 2019 09:16:48 +0300 From: Vitaly Chikunov To: Mimi Zohar Cc: Herbert Xu , David Howells , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify Message-ID: <20190328061648.knexdusdcadubeu6@altlinux.org> Mail-Followup-To: Mimi Zohar , Herbert Xu , David Howells , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org References: <20190326125842.24110-1-vt@altlinux.org> <20190326125842.24110-11-vt@altlinux.org> <1553710220.4608.9.camel@linux.ibm.com> <20190327201441.ikw76qzpgzm6t35b@altlinux.org> <1553718067.4608.43.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1553718067.4608.43.camel@linux.ibm.com> User-Agent: NeoMutt/20171215-106-ac61c7 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 27, 2019 at 04:21:07PM -0400, Mimi Zohar wrote: > > > diff --git a/security/integrity/digsig_asymmetric.c > b/security/integrity/digsig_asymmetric.c > > > > index d775e03fbbcc..99080871eb9f 100644 > > > > --- a/security/integrity/digsig_asymmetric.c > > > > +++ b/security/integrity/digsig_asymmetric.c > > > > @@ -104,9 +104,16 @@ int asymmetric_verify(struct key *keyring, const char *sig, > > > > > > > > memset(&pks, 0, sizeof(pks)); > > > > > > > > - pks.pkey_algo = "rsa"; > > > > pks.hash_algo = hash_algo_name[hdr->hash_algo]; > > > > - pks.encoding = "pkcs1"; > > > > + if (hdr->hash_algo == HASH_ALGO_STREEBOG_256 || > > > > + hdr->hash_algo == HASH_ALGO_STREEBOG_512) { > > > > + /* EC-RDSA and Streebog should go together. */ > > > > + pks.pkey_algo = "ecrdsa"; > > > > + pks.encoding = "raw"; > > > > > > IMA signatures are stored as xattrs, making them persistent. ?Support > > > for streebog was upstreamed in linux-5.0. ?This change would break > > > existing systems using streebog. ?As long as this is not yet a concern > > > > In what sense it would break systems? > > For example, if executable files are currently labeled with > rsa/streebog signatures, then enforcing file data integrity I assume > would break if the kernel uses ecrdsa/streebog. Ah. No, I did not implement RSA(Streebog) intentionally, since Streebog is not in the list of permitted hashes for PKCS1. You may notice this by the lack of appropriate rsa_asn1_template[] entry. Thanks, > > Mimi > > > > > Unless kernel crashes or signature is recognized as valid, I think, it should > > not be called a break. > > > > > Reviewed-by: ?Mimi Zohar > > > > Thanks! > > > > > > > > > + } else { > > > > + pks.pkey_algo = "rsa"; > > > > + pks.encoding = "pkcs1"; > > > > + } > > > > pks.digest = (u8 *)data; > > > > pks.digest_size = datalen; > > > > pks.s = hdr->sig; > >