Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp847954pxb; Wed, 13 Jan 2021 18:12:45 -0800 (PST) X-Google-Smtp-Source: ABdhPJz9KlUnQF/32zxKxPunbJQPu9DvLq6zoaxx8GtKTvaJvU65MblH8UNzhpAJX7ixy9ftn9u8 X-Received: by 2002:a17:906:36da:: with SMTP id b26mr3544307ejc.28.1610590365294; Wed, 13 Jan 2021 18:12:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610590365; cv=none; d=google.com; s=arc-20160816; b=jfylx6XmCNwPXJ6xTeyxuGD5A3XytMYjyaRmokiU5MLgVaNNeOhUkeAY4Jm1cMIDa0 ro3PDapUCdk6Ua6nReFfe5P4KT+UwPI0CSagG0RCF7FtgSwkxQ8FbmV+9LdJ77tZT3HS s74hBO5lzrUvtBo/zCfmU/Sq+QoH8hUXw3cOdo2b1MVWF10rvmmpmyBBI+zxhS1rnrYs O4K0DKQQCmPrhQApvLvN75AwRA7CrDkUBq+jBCBbYfJgvpO62YMVlhlGShAGVI9sZx2K pbF4rsOF3cdgsCu6OTx2K9EKqMOXpMME6BRddvcJj5u3EVuynry8mqZ09GfJx9lm0fuv CT3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=cHpWTw6lcPxz7z8H8yQJbwdU01y9cP5VFlHIAcOYlIE=; b=dSi28qaWj2pYsoARQz/YKbWapxDFxCHFa0vMyX746TVU0LdAl1BuLGrxh4NygxrQLq 4oIRxfuxFdjJCz4lRSr8do1P0cGbZdj+vQQRCARtHW5lP+EVuXxlB9v0A1xiTP+2wmxc daOCw5DL85WknxY+EDYdhykI9b+ZfwRWi8tD9hYzj9SvjfXmSUqTU1j+1VZKoRbL5xqN m2PUnGta9UvcI8anoGhyBx6tg8sJ19YaXGVmzkcGe3Nw9nHb1lRbpqdC93BGNepP7q3l 3vkCHGAxRLGpNcztpmLPk6qHvC6dFY9vLAaKIA9kECa0Gatify9Tx6SJn4EhkoTGaIA3 h/lw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=B2jvRWZJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c12si1924565eja.450.2021.01.13.18.12.21; Wed, 13 Jan 2021 18:12:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=B2jvRWZJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729260AbhANCLo (ORCPT + 99 others); Wed, 13 Jan 2021 21:11:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52216 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729261AbhAMWLL (ORCPT ); Wed, 13 Jan 2021 17:11:11 -0500 Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B6CBC061575 for ; Wed, 13 Jan 2021 14:10:31 -0800 (PST) Received: by mail-ej1-x636.google.com with SMTP id e18so5258679ejt.12 for ; Wed, 13 Jan 2021 14:10:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cHpWTw6lcPxz7z8H8yQJbwdU01y9cP5VFlHIAcOYlIE=; b=B2jvRWZJURQ5oLNMwvJfonm7dSdUz89Ple+ZJuYOXcXZ7dhHpGH7Q7+w3X36ZBWmKC SZVY4kP8zTNT+/eQZiiqp5eK+9C6x1UFd4NdwG8nWK0baXnQTowRKcF6x3D5gHX0yQcF sfgeCszX8SGM2ryM3QdOT+nct7lR9nxs0DCnMjPMr4wOp7Lk/zuDSxlnHLC4M0d3KB1V ExMz9YrKyBAlaH3WiDJZkFL6Usft206o7TZMgfl2/anU6vg/vQUQ3YUElFP3jasCt8PG Di8oWLX2naDdKMFQpSipQdpaWBSpYJ41I7KJ+HQLM0ttURYXt111lDa6pMOpcLdOH5yD jMBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cHpWTw6lcPxz7z8H8yQJbwdU01y9cP5VFlHIAcOYlIE=; b=o+zFaqM1jJxW8QMVa77GHoBSO5n9S2rHU4Dy+UxMTeQRSyupo5wtIbHr6V6ooHrmii 6Atlw08GTlpL5kJT5u1DyraWh3oyOSlG3Ry3iN7f3/8fvyqWjerC6dc8b9zU4D0wSlPJ 4uFnvGJhmaVazkSK/Hlyv/D8ZWpoUkDntiEf11lj7oLA8eJ9ICcmrBCIB9ywCgfILJdT sRu/7BWGE45D5lFVAR7dpDbuYz4kHd82kiXLT9BVSK7A5QQnrjQ1Maaoe9NL5ZN3n9qO Jlhc2XaTWTdBmyymI/4wHSTui4s6PkukIzwaGFYhHAoKzagebPYG088ihgM+7eUVZONP JnkQ== X-Gm-Message-State: AOAM533PNdUg8HfURH00ZqBmLIH0bTgj9P5FjahJqhMKRM7RINKorAtb 6tcvqmF0vW8+NYIetylWlRJVYOgZhcTyG/6KC6/y X-Received: by 2002:a17:906:3712:: with SMTP id d18mr3206433ejc.178.1610575829813; Wed, 13 Jan 2021 14:10:29 -0800 (PST) MIME-Version: 1.0 References: <20210108040708.8389-1-tusharsu@linux.microsoft.com> <20210108040708.8389-9-tusharsu@linux.microsoft.com> <97328fc71687a0e1c327f6821548be9ba35bb193.camel@linux.ibm.com> <71cddb6c8676ccd63c89364d805cfca76d32cb6e.camel@linux.ibm.com> In-Reply-To: <71cddb6c8676ccd63c89364d805cfca76d32cb6e.camel@linux.ibm.com> From: Paul Moore Date: Wed, 13 Jan 2021 17:10:18 -0500 Message-ID: Subject: Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook To: Mimi Zohar Cc: Tushar Sugandhi , Stephen Smalley , casey@schaufler-ca.com, agk@redhat.com, snitzer@redhat.com, gmazyland@gmail.com, tyhicks@linux.microsoft.com, sashal@kernel.org, James Morris , nramas@linux.microsoft.com, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, dm-devel@redhat.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 13, 2021 at 4:11 PM Mimi Zohar wrote: > On Wed, 2021-01-13 at 14:19 -0500, Paul Moore wrote: > > On Wed, Jan 13, 2021 at 2:13 PM Mimi Zohar wrote: > > > On Tue, 2021-01-12 at 11:27 -0500, Paul Moore wrote: > > > > On Thu, Jan 7, 2021 at 11:07 PM Tushar Sugandhi > > > > wrote: > > > > > From: Lakshmi Ramasubramanian > > > > > > > > > > SELinux stores the active policy in memory, so the changes to this data > > > > > at runtime would have an impact on the security guarantees provided > > > > > by SELinux. Measuring in-memory SELinux policy through IMA subsystem > > > > > provides a secure way for the attestation service to remotely validate > > > > > the policy contents at runtime. > > > > > > > > > > Measure the hash of the loaded policy by calling the IMA hook > > > > > ima_measure_critical_data(). Since the size of the loaded policy > > > > > can be large (several MB), measure the hash of the policy instead of > > > > > the entire policy to avoid bloating the IMA log entry. > > > > > > > > > > To enable SELinux data measurement, the following steps are required: > > > > > > > > > > 1, Add "ima_policy=critical_data" to the kernel command line arguments > > > > > to enable measuring SELinux data at boot time. > > > > > For example, > > > > > BOOT_IMAGE=/boot/vmlinuz-5.10.0-rc1+ root=UUID=fd643309-a5d2-4ed3-b10d-3c579a5fab2f ro nomodeset security=selinux ima_policy=critical_data > > > > > > > > > > 2, Add the following rule to /etc/ima/ima-policy > > > > > measure func=CRITICAL_DATA label=selinux > > > > > > > > > > Sample measurement of the hash of SELinux policy: > > > > > > > > > > To verify the measured data with the current SELinux policy run > > > > > the following commands and verify the output hash values match. > > > > > > > > > > sha256sum /sys/fs/selinux/policy | cut -d' ' -f 1 > > > > > > > > > > grep "selinux-policy-hash" /sys/kernel/security/integrity/ima/ascii_runtime_measurements | tail -1 | cut -d' ' -f 6 > > > > > > > > > > Note that the actual verification of SELinux policy would require loading > > > > > the expected policy into an identical kernel on a pristine/known-safe > > > > > system and run the sha256sum /sys/kernel/selinux/policy there to get > > > > > the expected hash. > > > > > > > > > > Signed-off-by: Lakshmi Ramasubramanian > > > > > Suggested-by: Stephen Smalley > > > > > Reviewed-by: Tyler Hicks > > > > > --- > > > > > Documentation/ABI/testing/ima_policy | 3 +- > > > > > security/selinux/Makefile | 2 + > > > > > security/selinux/ima.c | 64 ++++++++++++++++++++++++++++ > > > > > security/selinux/include/ima.h | 24 +++++++++++ > > > > > security/selinux/include/security.h | 3 +- > > > > > security/selinux/ss/services.c | 64 ++++++++++++++++++++++++---- > > > > > 6 files changed, 149 insertions(+), 11 deletions(-) > > > > > create mode 100644 security/selinux/ima.c > > > > > create mode 100644 security/selinux/include/ima.h > > > > > > > > I remain concerned about the possibility of bypassing a measurement by > > > > tampering with the time, but I appear to be the only one who is > > > > worried about this so I'm not going to block this patch on those > > > > grounds. > > > > > > > > Acked-by: Paul Moore > > > > > > Thanks, Paul. > > > > > > Including any unique string would cause the buffer hash to change, > > > forcing a new measurement. Perhaps they were concerned with > > > overflowing a counter. > > > > My understanding is that Lakshmi wanted to force a new measurement > > each time and felt using a timestamp would be the best way to do that. > > A counter, even if it wraps, would have a different value each time > > whereas a timestamp is vulnerable to time adjustments. While a > > properly controlled and audited system could be configured and > > monitored to detect such an event (I *think*), why rely on that if it > > isn't necessary? > > Why are you saying that even if the counter wraps a new measurement is > guaranteed. I agree with the rest of what you said. I was assuming that the IMA code simply compares the passed "policy_event_name" value to the previous value, if they are different a new measurement is taken, if they are the same the measurement request is ignored. If this is the case the counter value is only important in as much as that it is different from the previous value, even simply toggling a single bit back and forth would suffice in this case. IMA doesn't keep a record of every previous "policy_event_name" value does it? Am I misunderstanding how ima_measure_critical_data(...) works? -- paul moore www.paul-moore.com