Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1732645ybl; Tue, 3 Dec 2019 11:46:37 -0800 (PST) X-Google-Smtp-Source: APXvYqziWd4eqK6V1PcVrn5W5Yeh9W4O7OGCDYEQC7tEhUJcG2Z7zvHil4unjaUDdeMVM3PA6r16 X-Received: by 2002:a54:4896:: with SMTP id r22mr2737749oic.30.1575402397228; Tue, 03 Dec 2019 11:46:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575402397; cv=none; d=google.com; s=arc-20160816; b=SGfWNNWW8HhcyDN7M/E5+NtsEVjK3IFYN06J3Aez8TwDyICaSLib53U8oPxNE6lEEU axazJ/9rbkM7KqUH6dhbds3fIcipI4qE/Fw3T8mzjUWi9wvHIKYvErIx/2KofxVT0+l3 SWiKsIzN8IpdS/3dEjrJ5FzODzxjlTRvbYbh3uQFNnYTKfchxLOByAswWLENAUnTS5Xy D7fwElN7rl36vNAUlQu8HqU1tS/j4k94RGUZqtd+Bj6/NEg7AkfuTxfthNz+xUM0DMfE TnigZ8HujRDCOc+9Jxn+KL381lqG2/D11zWRNCFO8P6cjjSfr0hGujFTEMBCLYPGin3/ kigg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature:dkim-filter; bh=Ls9gfcdbAPHKGld7l6/oP5ZuS+qkiikvIWnUExXg588=; b=MjdTboKKxwQLYCzgbyV/wiWmPo8Wi2wqtvipSxEcMimIhEsJEOvaMdAsu47JYLBZHU CR0rSGu79W9g0uIpfXVwNsmoyrZSbDfQvG83WFIL7HIe2Qwk6dsCfx0uEbxdwoUZBPCF mnwcW4lvrahCHZZAwGPe4BgGZ7oBm5NZCN8y8iMMRk+zjSB8o/urKsxFWz5rCMQVc30l bvR8br7umplnOk8+xFrxAtfFk8Jtde6vQz7ruwJfVRpVXuCOnk716bZ3K5i7oh+P4L+a T0zm10woRNlwhMtFCWIU1IvRQwYK7Hw6dQ5Rar7zdcuVwIip6CjlBMTY5q2OEPCNEC0k 5ghQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ZtGEgS5e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s18si1865032otq.131.2019.12.03.11.46.24; Tue, 03 Dec 2019 11:46:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ZtGEgS5e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727287AbfLCTpN (ORCPT + 99 others); Tue, 3 Dec 2019 14:45:13 -0500 Received: from linux.microsoft.com ([13.77.154.182]:45824 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726564AbfLCTpN (ORCPT ); Tue, 3 Dec 2019 14:45:13 -0500 Received: from [10.137.112.111] (unknown [131.107.147.111]) by linux.microsoft.com (Postfix) with ESMTPSA id 55ED620B7185; Tue, 3 Dec 2019 11:45:12 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 55ED620B7185 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1575402312; bh=Ls9gfcdbAPHKGld7l6/oP5ZuS+qkiikvIWnUExXg588=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=ZtGEgS5e17IvkRkOmW1pS5ev781eHSFwaQ7kQEot0AFEeeBaOV3oLZWGvgfYpB7bN tZrYMNOmmU5eHBo3II1BYGL0ter0oSp7y1mjIzQcS0LGCO9hj6Jgb/v+gldEcoU2JM q94ngUXI3xn2S2UY0lzwDFr79sQwo9/KlYGc02NA= Subject: Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys To: Mimi Zohar , linux-integrity@vger.kernel.org Cc: eric.snowberg@oracle.com, dhowells@redhat.com, matthewgarrett@google.com, sashal@kernel.org, jamorris@linux.microsoft.com, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org References: <20191127015654.3744-1-nramas@linux.microsoft.com> <20191127015654.3744-6-nramas@linux.microsoft.com> <1575375945.5241.16.camel@linux.ibm.com> From: Lakshmi Ramasubramanian Message-ID: <2d20ce36-e24e-e238-4a82-286db9eeab97@linux.microsoft.com> Date: Tue, 3 Dec 2019 11:45:31 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <1575375945.5241.16.camel@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Mimi, On 12/3/2019 4:25 AM, Mimi Zohar wrote: > > A keyring can be created by any user with any keyring name, other than >  ones dot prefixed, which are limited to the trusted builtin keyrings. >  With a policy of "func=KEY_CHECK template=ima-buf keyrings=foo", for > example, keys loaded onto any keyring named "foo" will be measured. >  For files, the IMA policy may be constrained to a particular uid/gid. >  An additional method of identifying or constraining keyring names > needs to be defined. > > Mimi > Are you expecting a functionality like the following? => Measure keys added to keyring "foo", but exclude certain keys (based on some key identifier) Sample policy might look like below: action=MEASURE func=KEY_CHECK keyrings=foo|bar action=DONT_MEASURE key_magic=blah So a key with key_magic "blah" will not be measured even though it is added to the keyring "foo". But any other key added to "foo" will be measured. What would the constraining field in the key may be - Can it be SHA256 hash of the public key? Or, some other unique identifier? Could you please clarify? thanks, -lakshmi