Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2163387pxa; Mon, 24 Aug 2020 07:01:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzM3da+Z8F2zDOZ0TfbsGGqISQjCv86l7gnBCpJDoQDRBct1/m9v6ZsF4ZAGT6mQHTG72Ee X-Received: by 2002:a17:906:1106:: with SMTP id h6mr5719910eja.200.1598277714379; Mon, 24 Aug 2020 07:01:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598277714; cv=none; d=google.com; s=arc-20160816; b=r1audJsCbt0AgWs2GYY08GKyORwiYHuKRWbeeXjHpRc7z8Xd8b9RMoCt85jaWCJkvJ ay7qiaDkNkAigJaHtnFSwMmZWEkUmOWiK+i4oFfkqVAjOemg0qF0BUGDbhlz+mZY+FHP 61CMJc3eA+avTXMTI2BMbSkPd5ov3SVHn5oQ9jZ1LUPhZ9DFTgG3J7kMfFbdIgE7m7wV cvI6NCl6dpcPV1kq/ysYB7I0Koa5Bl1taqF5piQXQWlm5+TFKMFoyAaemjtfZtzM7HSE KMNpNJO2GT/ZeBDW1diypESLY+L4nbiKFblch/y6CyxWwUn5thSi9/MTDuudGYjvCkZ6 9p1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=a8tt+CMGp7q/HOS53VXK8umX/MA6yVJ2CpHA9QlQNUw=; b=l0iri4f6ihKszDRtS29R3m7kxa8ok9rgje7ivKKUpOPXcIEX+vNpECpGSkI/BIR30B oA5OUJUTLST3R5MOgfVOo/5cojxBwUAe4FGr+vHsda8+mkftIizI/qAhX+1Kb2NSnnZO S1VN+b0S4bQwvGhUemJPJM8u+R3QOnPB75Sibm/1tLa2kh+z7abe4HsfJ0NGBbwgRmZN bcKW+tclY8SBLyoH/TIRBjBRG/FMLggfxMt/2/YH/ESSzDRdW9TMXZ4WRVIolCEpSKyc AwfN1f911Ajr1A7jZ2YiEp62V/Sqe/I0pLkn5jR1lziI145ai/MLEE9P6ZWOX/8nxYDW MW3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=j8uvweuk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cz6si7913114edb.254.2020.08.24.07.01.30; Mon, 24 Aug 2020 07:01:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=j8uvweuk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727011AbgHXOAW (ORCPT + 99 others); Mon, 24 Aug 2020 10:00:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57494 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725921AbgHXOAS (ORCPT ); Mon, 24 Aug 2020 10:00:18 -0400 Received: from mail-oi1-x242.google.com (mail-oi1-x242.google.com [IPv6:2607:f8b0:4864:20::242]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 89841C061573; Mon, 24 Aug 2020 07:00:18 -0700 (PDT) Received: by mail-oi1-x242.google.com with SMTP id j18so3454733oig.5; Mon, 24 Aug 2020 07:00:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=a8tt+CMGp7q/HOS53VXK8umX/MA6yVJ2CpHA9QlQNUw=; b=j8uvweukLv7148MhKVNormlhapYg2r0+5kfglczLY9e1LRAzzw1ydGewupqwmMvSU9 0SjUkT2GcExDoXKcNevn7vGcs0xGz2h1N4tCpeSa0iXNchm6UQrqjss8wj8iqknBoa+S 4MyIoD7O1E/7jGZ1HXXTiSnTZI3z75OxzfwbLWooVh5tkB9F7CVR106kj2K77Gh7i9XF R4rRhqAGQvSFYzETpRYZQRJ6IgM/bI2fHoUXs2zfGtW/xvFSxFiN3NLS1+UM9fAiOcBA a11bZrRB4MWND2aPR8LFcTFIthLCJPUkn3jleIrczBllIiwRIWw7tpwZbx1P6n/krn/Q xt3Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=a8tt+CMGp7q/HOS53VXK8umX/MA6yVJ2CpHA9QlQNUw=; b=kGZk87T8Cc1h4YPI6UyNdqulXpbOOc2kfJZ6cKMhnOY9uVN7+9/13q6oQ1BY6K+A3k U+js+qnbrND0F0whi1XLTmcZ9T0hfP9VWKdcH5EclQI0NfNN/iqWBjTL+jmVT8qJw3Th l2g7tanKvTwyWf6cTTaQdtFRVewtNGvYcpUABZsCLnKVey1RgEBlYE9aiuIeat3W7WKV LDqz1OMGPAimTaMErloh+R6j02f5Sn8f5ApSWQ+QaaDyxPzf7l6r31tBXsPdof44zkEm LF5N0pzTGHRTVUq33IP5yd05JkpaQavTtGKYek61aSx3KACgzH03tkaefPA+bApL/BR3 Ih4Q== X-Gm-Message-State: AOAM531IaKNpScUfaFa9kdFKZDZA0d0j7NeoZWfqKRTKB/+Y1hLdAqZy MJFcJxSrMl/guOYlsyFGwGOYoz/S7eB3kE2CqG8= X-Received: by 2002:a54:4817:: with SMTP id j23mr3170930oij.140.1598277617933; Mon, 24 Aug 2020 07:00:17 -0700 (PDT) MIME-Version: 1.0 References: <20200822010018.19453-1-nramas@linux.microsoft.com> In-Reply-To: <20200822010018.19453-1-nramas@linux.microsoft.com> From: Stephen Smalley Date: Mon, 24 Aug 2020 10:00:07 -0400 Message-ID: Subject: Re: [PATCH] SELinux: Measure state and hash of policy using IMA To: Lakshmi Ramasubramanian Cc: Mimi Zohar , Casey Schaufler , Tyler Hicks , tusharsu@linux.microsoft.com, sashal@kernel.org, James Morris , linux-integrity@vger.kernel.org, SElinux list , LSM List , linux-kernel Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 21, 2020 at 9:00 PM Lakshmi Ramasubramanian wrote: > > Critical data structures of security modules are currently not measured. > Therefore an attestation service, for instance, would not be able to > attest whether the security modules are always operating with the policie= s > and configuration that the system administrator had setup. The policies > and configuration for the security modules could be tampered with by > rogue user mode agents or modified through some inadvertent actions on > the system. Measuring such critical data would enable an attestation > service to reliably assess the security configuration of the system. > > SELinux configuration and policy are some of the critical data for this > security module that needs to be measured. This measurement can be used > by an attestation service, for instance, to verify if the configuration > and policies have been setup correctly and that they haven't been tampere= d > with at runtime. > > Measure SELinux configuration, policy capabilities settings, and the hash > of the loaded policy by calling the IMA hook ima_measure_critical_data(). > Since the size of the loaded policy can be quite large, hash of the polic= y > is measured instead of the entire policy to avoid bloating the IMA log. > > Enable early boot measurement for SELinux in IMA since SELinux > initializes its state and policy before custom IMA policy is loaded. > > Sample measurement of SELinux state and hash of the policy: > > 10 e32e...5ac3 ima-buf sha256:86e8...4594 selinux-state-1595389364:287899= 386 696e697469616c697a65643d313b656e61626c65643d313b656e666f7263696e673d303= b636865636b72657170726f743d313b6e6574776f726b5f706565725f636f6e74726f6c733d= 313b6f70656e5f7065726d733d313b657874656e6465645f736f636b65745f636c6173733d3= 13b616c776179735f636865636b5f6e6574776f726b3d303b6367726f75705f7365636c6162= 656c3d313b6e6e705f6e6f737569645f7472616e736974696f6e3d313b67656e66735f73656= 36c6162656c5f73796d6c696e6b733d303 > 10 9e81...0857 ima-buf sha256:4941...68fc selinux-policy-hash-1597335667:= 462051628 8d1d...1834 > > To verify the measurement check the following: > > Execute the following command to extract the measured data > from the IMA log for SELinux configuration (selinux-state). > > grep -m 1 "selinux-state" /sys/kernel/security/integrity/ima/ascii_runt= ime_measurements | cut -d' ' -f 6 | xxd -r -p > > The output should be the list of key-value pairs. For example, > initialized=3D1;enabled=3D1;enforcing=3D0;checkreqprot=3D1;network_peer_= controls=3D1;open_perms=3D1;extended_socket_class=3D1;always_check_network= =3D0;cgroup_seclabel=3D1;nnp_nosuid_transition=3D1;genfs_seclabel_symlinks= =3D0; > > To verify the measured data with the current SELinux state: > > =3D> enabled should be set to 1 if /sys/fs/selinux folder exists, > 0 otherwise > > For other entries, compare the integer value in the files > =3D> /sys/fs/selinux/enforce > =3D> /sys/fs/selinux/checkreqprot > And, each of the policy capabilities files under > =3D> /sys/fs/selinux/policy_capabilities > > For selinux-policy-hash, the hash of SELinux policy is included > in the IMA log entry. > > To verify the measured data with the current SELinux policy run > the following commands and verify the output hash values match. > > sha256sum /sys/fs/selinux/policy | cut -d' ' -f 1 > > grep -m 1 "selinux-policy-hash" /sys/kernel/security/integrity/ima/asci= i_runtime_measurements | cut -d' ' -f 6 > > This patch is dependent on the following patch series: > https://patchwork.kernel.org/patch/11709527/ > https://patchwork.kernel.org/patch/11730193/ > https://patchwork.kernel.org/patch/11730757/ > > Signed-off-by: Lakshmi Ramasubramanian > Suggested-by: Stephen Smalley > Reported-by: kernel test robot # error: implicit declarat= ion of function 'vfree' > Reported-by: kernel test robot # error: implicit declarat= ion of function 'crypto_alloc_shash' > Reported-by: kernel test robot # sparse: symbol 'security= _read_selinux_policy' was not declared. Should it be static? > --- > +int security_read_policy_kernel(struct selinux_state *state, > + void **data, size_t *len) > +{ > + int rc; > + > + rc =3D security_read_policy_len(state, len); > + if (rc) > + return rc; > + > + *data =3D vmalloc(*len); > + if (!*data) > + return -ENOMEM; > > + return security_read_selinux_policy(state, data, len); > } See the discussion here: https://lore.kernel.org/selinux/20200824113015.1375857-1-omosnace@redhat.co= m/T/#t In order for this to be safe, you need to ensure that all callers of security_read_policy_kernel() have taken fsi->mutex in selinuxfs and any use of security_read_policy_len() occurs while holding the mutex. Otherwise, the length can change between security_read_policy_len() and security_read_selinux_policy() if policy is reloaded.