Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1366194pxb; Fri, 20 Nov 2020 07:51:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJwZOYVQRM/mW3aBW4xXT1vbAQqRCY869YD0OmMVTaLTPr7WuanLdit4qfHa+0m9OQaKJ4E1 X-Received: by 2002:a17:906:c059:: with SMTP id bm25mr11803101ejb.20.1605887488961; Fri, 20 Nov 2020 07:51:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605887488; cv=none; d=google.com; s=arc-20160816; b=ozN5D8teMhOovqGG+4VXXkV0hsIJ7kiuv/8zLSlr7yb0c8hBwNYrIcGdemAFjWPkBl dGlybpSxZ8kU7Unq22s/QywqBXD8cNRePa9YXEvKkPiunaoezxxVzzQ7s/EC1olk9/v6 PcWsnMC+d6rQS7mDovW2WxfMKC7wG0rsIe7LENWwviAvNSiTxIgfCWTihgghhB+ofQIB 0A6ZxBkiT0CVoXJzHnDJ+a8LXgrmr5hfzir1cbx9iI1xhLLI0pwNDyMSgb5kqaqFEq8c N+8mX2K5A0p7MfmV+l8x7OmgShbJ+tpTcAYHQoo0tl3aR1MbcIervxQjO4u1CH/UO1Rs EEGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=LXHxzZl79d/48T/rQQacXvVSsfNSE7G5+2LE7Q57eKo=; b=LoFAzl8tDYAX+7bAog3y/TE4Ek7mSbz+Dc91I4pOjFJXQf7aXNovcZObsaZS5XJwqV GmXHVXAuCfKJ1ZN1rGOIoK1mkr5/POonqpJV3tL1hzK1YPMITQ282Qyv9XhG+LfIQFdK 6gW/AUzPOWv8C/+a7RpqISSzFPsEL2Mybx82qsty4/mxocsnjexWDVKfPo1LGslBCnYg NKFo+0E3nFYPyurbfvPaBKehHNbpxY4gEOF/GL6DhgJ27eXiU52m9N7I47kdpb5JY5Nj aFkl/uLANj+0IqRj2p6PdfRjAL1GDa32TN8ATaGDTE8Vm2HvYgHbeuEGvducgSUQy7tI jqkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=I8SSCr9Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s3si1845988ejc.65.2020.11.20.07.51.05; Fri, 20 Nov 2020 07:51:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=I8SSCr9Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729469AbgKTPtg (ORCPT + 99 others); Fri, 20 Nov 2020 10:49:36 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:56590 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728320AbgKTPtg (ORCPT ); Fri, 20 Nov 2020 10:49:36 -0500 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0AKF5Vwj110532; Fri, 20 Nov 2020 10:49:30 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : subject : from : to : cc : date : in-reply-to : references : content-type : mime-version : content-transfer-encoding; s=pp1; bh=LXHxzZl79d/48T/rQQacXvVSsfNSE7G5+2LE7Q57eKo=; b=I8SSCr9YTv2WeKix3NeKWxs+8xdgcnKnPpjkIjXxWD/RbF2FT2+4Aj4Q4J088qxubchR GSDRPdVCwKsBHMPonxZ+Ak18Guh0DmB4Lxsg2W7xl6YmdiVq1osZM10iksibK51jqoHf 0n5AJxFxPMUivyvpLfoBlBDjbg7IKV5IjRTAQyp1BGwrLu+omq1i6w7lByyHLg82pNSW 2Y6FqsszwsigZGtBktys5qpuTzyVhvhqujUKQBm2Qd0dO40mkpdYHyYTihFmUeQvfn0D zegiRb5IpfxxD2dJGnzfdKnSArMn7Rf4Mg7kSM4ukj9ZmRRAPLJ7Vv6wWuY1wRsUXkX9 2g== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 34xd1kr363-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Nov 2020 10:49:30 -0500 Received: from m0098394.ppops.net (m0098394.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 0AKF5s3J113261; Fri, 20 Nov 2020 10:49:29 -0500 Received: from ppma06ams.nl.ibm.com (66.31.33a9.ip4.static.sl-reverse.com [169.51.49.102]) by mx0a-001b2d01.pphosted.com with ESMTP id 34xd1kr34k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Nov 2020 10:49:29 -0500 Received: from pps.filterd (ppma06ams.nl.ibm.com [127.0.0.1]) by ppma06ams.nl.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 0AKFloc2012106; Fri, 20 Nov 2020 15:49:27 GMT Received: from b06avi18878370.portsmouth.uk.ibm.com (b06avi18878370.portsmouth.uk.ibm.com [9.149.26.194]) by ppma06ams.nl.ibm.com with ESMTP id 34w4yfj8rg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Nov 2020 15:49:27 +0000 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06avi18878370.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 0AKFnO0Q60490060 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Nov 2020 15:49:24 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9C95311C050; Fri, 20 Nov 2020 15:49:24 +0000 (GMT) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 58FD111C058; Fri, 20 Nov 2020 15:49:21 +0000 (GMT) Received: from li-f45666cc-3089-11b2-a85c-c57d1a57929f.ibm.com (unknown [9.160.96.125]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 20 Nov 2020 15:49:21 +0000 (GMT) Message-ID: <4634c6c12b2452849f73ed2d5a4d168707e0ac9a.camel@linux.ibm.com> Subject: Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA From: Mimi Zohar To: Tushar Sugandhi , stephen.smalley.work@gmail.com, casey@schaufler-ca.com, agk@redhat.com, snitzer@redhat.com, gmazyland@gmail.com, paul@paul-moore.com Cc: tyhicks@linux.microsoft.com, sashal@kernel.org, jmorris@namei.org, nramas@linux.microsoft.com, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, dm-devel@redhat.com Date: Fri, 20 Nov 2020 10:49:20 -0500 In-Reply-To: <20201119232611.30114-9-tusharsu@linux.microsoft.com> References: <20201119232611.30114-1-tusharsu@linux.microsoft.com> <20201119232611.30114-9-tusharsu@linux.microsoft.com> Content-Type: text/plain; charset="ISO-8859-15" X-Mailer: Evolution 3.28.5 (3.28.5-12.el8) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312,18.0.737 definitions=2020-11-20_07:2020-11-20,2020-11-20 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 phishscore=0 clxscore=1015 suspectscore=0 bulkscore=0 lowpriorityscore=0 adultscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011200104 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Tushar, Lakshmi, On Thu, 2020-11-19 at 15:26 -0800, Tushar Sugandhi wrote: > From: Lakshmi Ramasubramanian > > IMA measures files and buffer data such as keys, command line arguments > passed to the kernel on kexec system call, etc. While these measurements > enable monitoring and validating the integrity of the system, it is not > sufficient. The above paragraph would make a good cover letter introduction. > In-memory data structures maintained by various kernel > components store the current state and policies configured for > the components. Various data structures, policies and state stored in kernel memory also impact the integrity of the system. The 2nd paragraph could provide examples of such integrity critical data. This patch set introduces a new IMA hook named ima_measure_critical_data() to measure kernel integrity critical data. thanks, Mimi