Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4599345yba; Sun, 12 May 2019 17:26:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkALvSOA+32KYqZ77FxQuK/e+xyV97GKCRpCrUj+L2y4+5DlhSLbmHIf8LQ3aPurX2rzqO X-Received: by 2002:a63:754b:: with SMTP id f11mr28218153pgn.32.1557707170082; Sun, 12 May 2019 17:26:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557707170; cv=none; d=google.com; s=arc-20160816; b=t1HhB4hooHtUgzNxSpDmvBqi8H6OHCFLOQ6n6yOgK8Wn0GDo2ioOO+mlUqKnTDy1Ao O7x3FAQ1777roxtx+Jqee6kepfg1ZA8mDtIOylcTIW0xUaSMC47SPSI9MyTxqxJlZaYu FtW5ggP5IfJIprZAMLSz1LyGiJbTDnNfEOP/Owt24IFHOxzqBLbuRAYxqYHkOD5QWSkI EJMJNMLDB+hnhM208hEKpNXNjRJl/9f/0gjNWSj7ecVZax19hmRettnA4fSW/YEisJiK mrOhD+Kga5V2XTn6RCARsSO6L4wtu91loyJdOKFDEra1R1+jn/tjcLLYHUHgD9BZkjT3 Peag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:from:cc:to:subject :content-transfer-encoding:mime-version:references:in-reply-to :user-agent:date:dkim-signature:dkim-filter; bh=/7GRxEbhkfOEmbDinh0dyNPUVrqyoxdHEHoAVKW9xGE=; b=IfcLhezvpOZMgBcX47IYA+0fRQ+8HamBznZI8D/9HUsFT4bXbANIQiL3fg6QSedJhr d2/EEOU1KiDeXSgmnKE/qJSXL7tValLXmNdNOvh+mjgSyhj93f0S/Ptg2zYZNHp2O+Ww hZa8xVZ5Hd17Dq/yKLFSG6sZ4u54t79Y4fvOHb7JehtPD6AoiCVslWtsGjP/L3SB2Uf8 qwdU/Py3jE08D8bwSft6mI2d2od08HU01nYSlr7xXyiiIxzvr08pNuaz62BtP1C7nmJC BQ1u9tFGNyDRRH8XiGIOuDwDpqwvQw5vyOm6BoybussrdmbWMBk5OaNuMmbBZgDRNCSb 3Img== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@zytor.com header.s=2019041745 header.b=kPwO7Xjx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 67si13403284pla.356.2019.05.12.17.25.53; Sun, 12 May 2019 17:26:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@zytor.com header.s=2019041745 header.b=kPwO7Xjx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727230AbfEMAXk (ORCPT + 99 others); Sun, 12 May 2019 20:23:40 -0400 Received: from terminus.zytor.com ([198.137.202.136]:40109 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727105AbfEMAXj (ORCPT ); Sun, 12 May 2019 20:23:39 -0400 Received: from [IPv6:2601:646:8680:2bb1:80c8:8cb8:dd71:1e2e] ([IPv6:2601:646:8680:2bb1:80c8:8cb8:dd71:1e2e]) (authenticated bits=0) by mail.zytor.com (8.15.2/8.15.2) with ESMTPSA id x4D0NN5I3267505 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Sun, 12 May 2019 17:23:24 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com x4D0NN5I3267505 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2019041745; t=1557707005; bh=/7GRxEbhkfOEmbDinh0dyNPUVrqyoxdHEHoAVKW9xGE=; h=Date:In-Reply-To:References:Subject:To:CC:From:From; b=kPwO7Xjx9BF5tTOaClmwEtsRb+cB/Qfn980At88CURskK8z+agDkl+UsO9O4ryMsd OBdU66w7Nu4rwOOjD7pMDga/6lwrt2yQN3mb25om+GLtwg6tTNtOvewt8HCJemkASp XWOoQYwiKM2iSYr7AzBg+RDd8PBzDng4amcENtQdGAn2Hxe/fyLw6x+v9nKHECi+zn ykrD1rmKo0b/XkiRUvTWIfZfvtmnJ6k7G0pWj+4ZoPChvfTuDErATGeJEyRRkYjfPP LNoVp3Fl+v6qEOGQYa46kHS1Ul5TdBpUjuJZ0gXI5Fd4cppa/b7r1ncELkcbo5E4xt dP6AatRgj0Z1A== Date: Sun, 12 May 2019 17:23:16 -0700 User-Agent: K-9 Mail for Android In-Reply-To: <20190512153105.GA25254@light.dominikbrodowski.net> References: <20190512153105.GA25254@light.dominikbrodowski.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk To: Dominik Brodowski , Mimi Zohar CC: Roberto Sassu , viro@zeniv.linux.org.uk, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, initramfs@vger.kernel.org, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, zohar@linux.vnet.ibm.com, silviu.vlasceanu@huawei.com, dmitry.kasatkin@huawei.com, takondra@cisco.com, kamensky@cisco.com, arnd@arndb.de, rob@landley.net, james.w.mcmechan@gmail.com From: hpa@zytor.com Message-ID: <0D08BE40-475A-47AB-A3CE-B8EC4C4357D9@zytor.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On May 12, 2019 8:31:05 AM PDT, Dominik Brodowski wrote: >On Sun, May 12, 2019 at 03:18:16AM -0700, hpa@zytor=2Ecom wrote: >> > Couldn't this parsing of the =2Exattr-list file and the setting of >the xattrs >> > be done equivalently by the initramfs' /init? Why is kernel >involvement >> > actually required here? >>=20 >> There are a lot of things that could/should be done that way=2E=2E=2E > >Indeed=2E=2E=2E so why not try to avoid adding more such "things", and >keeping >them in userspace (or in a fork_usermode_blob)? > > >On Sun, May 12, 2019 at 08:52:47AM -0400, Mimi Zohar wrote: >> It's too late=2E The /init itself should be signed and verified=2E > >Could you elaborate a bit more about the threat model, and why >deferring >this to the initramfs is too late? > >Thanks, > Dominik I tried over 10 years ago to make exactly that happen=2E=2E=2E it was call= ed the klibc project=2E Linus turned it down because he felt that it didn't= provide enough immediate benefit to justify the complexity, which of cours= e creates the thousand-cuts problem: there will never be *one single* event= that *by itself* justifies the transition=2E --=20 Sent from my Android device with K-9 Mail=2E Please excuse my brevity=2E