Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp934327pxa; Wed, 5 Aug 2020 16:56:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwQbnmopxxPwNi78G4c7rDaSZ9O6N09tnQyMQgF26B9ySrQxXKfVK5yccBMUvNo5dMpg1lI X-Received: by 2002:a17:906:9984:: with SMTP id af4mr1880863ejc.90.1596671817297; Wed, 05 Aug 2020 16:56:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596671817; cv=none; d=google.com; s=arc-20160816; b=vM1gy9EJ+0Ekp6twPecO6HJRgH5KuwzD/25mtNI/N9b4D/6QW7Yt1bBIJz7EGslzg9 p2ApOmjTUyZlVku76nwBC73eZ6KzUh50bNBSFSgA5j1MjsTr2YMCFSam50TwLM2ggjt+ 8Y6osnXlCvfBRToM3Ok72JEMpms3Gy7nDLr3v5OaV4fjMBjVySjIeAYduu5G6vuRALtv hu2zRG193uxLd2criBc0DDLmogOWCSiK5CBt3ENVEEAc0Nj97ZXAI1TbDs7EbHB0wftl MafuAhTU7rsde1Olj/v083AHdJNoEZL8MEU2Cr6fwO8yiWigv74Y53BxwyC/cWNzueQl 5ZoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=1ir/KtOpBXhd1/U0UgVRj98dRpZinB87zQXMk/q2q0c=; b=tN0gOZJlVD32qjSprNeiIoLjBMHvS/GRezBPBhqiWskrz5nRodIcv9D69WbvQJcRfd 1CqA2YWW60jTaQsWMqSoPMS2tRQzjCkt7CwJUPtAM5ElMq1xy8GRHx0KPDiLbisKb3Ww BJDT89+xEGXc2bjUBft2kkEEfsUDPZMPacJnKQBkqDNzw9PuGq9ki4kQ4RKFQfDnq0MB YOZbRvqFr8YLEFQJrFvVro0DH/0hIKZyDJmUUbwDS5fbrasmo2qU1ZS1S2YA/mL28oYy 5+GoY5798rba30014iFhRHrb0BFJQdSuo//m2NiqhwGE5kOHg+INAIr52z+MdzxhJH0x v3ew== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s18si2228135eja.619.2020.08.05.16.56.29; Wed, 05 Aug 2020 16:56:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726622AbgHEXwZ (ORCPT + 99 others); Wed, 5 Aug 2020 19:52:25 -0400 Received: from namei.org ([65.99.196.166]:57738 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725779AbgHEXwY (ORCPT ); Wed, 5 Aug 2020 19:52:24 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id 075Npvex020649; Wed, 5 Aug 2020 23:51:57 GMT Date: Thu, 6 Aug 2020 09:51:57 +1000 (AEST) From: James Morris To: Mimi Zohar cc: James Bottomley , Deven Bowers , Pavel Machek , Sasha Levin , snitzer@redhat.com, dm-devel@redhat.com, tyhicks@linux.microsoft.com, agk@redhat.com, paul@paul-moore.com, corbet@lwn.net, nramas@linux.microsoft.com, serge@hallyn.com, pasha.tatashin@soleen.com, jannh@google.com, linux-block@vger.kernel.org, viro@zeniv.linux.org.uk, axboe@kernel.dk, mdsakib@microsoft.com, linux-kernel@vger.kernel.org, eparis@redhat.com, linux-security-module@vger.kernel.org, linux-audit@redhat.com, linux-fsdevel@vger.kernel.org, linux-integrity@vger.kernel.org, jaskarankhurana@linux.microsoft.com Subject: Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE) In-Reply-To: Message-ID: References: <20200728213614.586312-1-deven.desai@linux.microsoft.com> <20200802115545.GA1162@bug> <20200802140300.GA2975990@sasha-vm> <20200802143143.GB20261@amd> <1596386606.4087.20.camel@HansenPartnership.com> <1596639689.3457.17.camel@HansenPartnership.com> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 5 Aug 2020, Mimi Zohar wrote: > If block layer integrity was enough, there wouldn't have been a need > for fs-verity. Even fs-verity is limited to read only filesystems, > which makes validating file integrity so much easier. From the > beginning, we've said that fs-verity signatures should be included in > the measurement list. (I thought someone signed on to add that support > to IMA, but have not yet seen anything.) > > Going forward I see a lot of what we've accomplished being incorporated > into the filesystems. When IMA will be limited to defining a system > wide policy, I'll have completed my job. What are your thoughts on IPE being a standalone LSM? Would you prefer to see its functionality integrated into IMA?