Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1530332ybl; Tue, 3 Dec 2019 08:33:05 -0800 (PST) X-Google-Smtp-Source: APXvYqxduDqnCteArH0idTaphvHoyJZ23z3EQcfqdYeV9o7AmC47HhirlTwgAG1MXmNwwXICsOax X-Received: by 2002:a54:4612:: with SMTP id p18mr4544068oip.110.1575390785742; Tue, 03 Dec 2019 08:33:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575390785; cv=none; d=google.com; s=arc-20160816; b=K+aq20RTIiix2q+Y7EFlJ4zUkkXTM5a5BMI8KuINHLnsv1aAWD4u1MTE0LKaNbS8AP h+V+WUKN56DfoUZ81+vFxU7P0sG/QifUPOq5IKoVS7zMgeES5DIn9OlmnxiHxlRF30qH qr0Kn4etDlZ0WMhzrj08nn/l0e1AlVjskphBORQFveMr8ugHcQ7eykOKurbbJD/YR70P zASZQVCNfwQRpvOMijBNQ6zrtYHR+FL8kOZTtGLgUv+wuRWv20XZEYJO4+e5//YmNMPV tojdonKBo7mDGIY0jKhVDswDe3c/wVS2kJMz11R/5TVv9sB9KQwow63+ryeYZWFrA7qd 66nA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature:dkim-filter; bh=RfT3Xc5qnAruXZFI6OG30/tifx3RL/kw/rwni/UoLpU=; b=RzREZagb8tC8OwTdym1qY6EeaDwjFLFt7mcZ7rbFODq2g+rbz8OaKWLteOH7FZC8mf jQ7gt1Z1azQlXl59ADz6jm0n1u1OW1+nNdyTg2XF/EdQXptvK/z1LcM5AxFRCuZ3vo4v sGDptUSFF7K12yA2WsLB12hN4ocOzli8Zfsj6jIeKUelS+5sMvoddXsxcmVjUIdkb3m0 SBq5TIhlu/NafpT5Ja9GVwjfXUoXt+0KJNUE5O58Jx9umwShT5UV93QV45a0uP89Bfxt 5pbzWZVY86rLwgNZqacAkJJSon6diPqXqLdo2S7ZqHdZ4i9flV2giKQH0ZZfAVYhUSyG HULw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=J8r+Jaga; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w7si1561875oie.196.2019.12.03.08.32.52; Tue, 03 Dec 2019 08:33:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=J8r+Jaga; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726534AbfLCQNb (ORCPT + 99 others); Tue, 3 Dec 2019 11:13:31 -0500 Received: from linux.microsoft.com ([13.77.154.182]:55776 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725848AbfLCQNa (ORCPT ); Tue, 3 Dec 2019 11:13:30 -0500 Received: from [10.137.112.111] (unknown [131.107.147.111]) by linux.microsoft.com (Postfix) with ESMTPSA id 0DDA520B7185; Tue, 3 Dec 2019 08:13:29 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 0DDA520B7185 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1575389610; bh=RfT3Xc5qnAruXZFI6OG30/tifx3RL/kw/rwni/UoLpU=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=J8r+JagaNtiAJ/mg5PGbrT5xib+SkrauLx8LbP40jwfWjRmnFEgz8OMZgb3HD81+6 TmXPDYZHSZ2pZyZg4etmixj012r8pbu2pd+JOKF7JK8e8Av4s6t6iw2cj69+RCmJnQ JRO738i7TzIuBOn7ihCyN3epZqQnPo1XnCMspyEI= Subject: Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys To: Mimi Zohar , linux-integrity@vger.kernel.org Cc: eric.snowberg@oracle.com, dhowells@redhat.com, matthewgarrett@google.com, sashal@kernel.org, jamorris@linux.microsoft.com, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org References: <20191127015654.3744-1-nramas@linux.microsoft.com> <20191127015654.3744-6-nramas@linux.microsoft.com> <1575375945.5241.16.camel@linux.ibm.com> From: Lakshmi Ramasubramanian Message-ID: Date: Tue, 3 Dec 2019 08:13:48 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <1575375945.5241.16.camel@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/3/2019 4:25 AM, Mimi Zohar wrote: Hi Mimi, > Hi Lakshmi, > > A keyring can be created by any user with any keyring name, other than >  ones dot prefixed, which are limited to the trusted builtin keyrings. >  With a policy of "func=KEY_CHECK template=ima-buf keyrings=foo", for > example, keys loaded onto any keyring named "foo" will be measured. >  For files, the IMA policy may be constrained to a particular uid/gid. >  An additional method of identifying or constraining keyring names > needs to be defined. > I agree - this is a good idea. Do you think this can be added as a separate patch set - enhancement to the current one, or should this be addressed in the current set? I was just about to send an update today that addresses your latest comments. Will hold it if you think the above change should be included now. Please let me know. thanks, -lakshmi