Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2216614pxb; Fri, 5 Mar 2021 09:54:32 -0800 (PST) X-Google-Smtp-Source: ABdhPJx0712iqj2a7fqHXL17iyIMhUF2VG8PiiW2Cvbi7L6blvmW5dfj4oU4HKeGUgNY+rgUzhFZ X-Received: by 2002:a17:907:110c:: with SMTP id qu12mr3414967ejb.442.1614966872614; Fri, 05 Mar 2021 09:54:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614966872; cv=none; d=google.com; s=arc-20160816; b=dsGyTh0vjL4MPrfLWtbVi996bqIY34TNYUCx8Ph+eqtYTQCSYYZvV09/BtiqaQErc5 g2rM6r14xCc2vRDIt4ZDe8DICTX44etCO5SOq1RXkEKibKyjoD6u4SAvFrBfYvxXmXbu LBgo3ILOSkpFWAZEn8Ck/H0zwSTlrabbyeTdxAKZs3qPsy8F3A0CmtHLoYoEjcItCrqz 1POlXHGhnyHqWSHDrMX58uC9a7owLPimlduKVBeB88u40MWcgm1Yk5Yd+ZMgTYvZHR2e 9kpl2KbRsX+AMXC8qcChu/bok5/3/GdxVQsER9iFfBS22D9Smui1Ji01Znt/End/cTMQ z+wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=9cy6NY2NneFUb+ai21Mer/bJAl+1fOEOH5Xn9JUNG4w=; b=L/aH5muWpiVYJ1vQgYZ37f6gDZdaB6iDGs3mlp3Z0GfLUGt5o+qs7warHC9qjRo1GS fiNYD+kIItvrZ98wkv44yNtFXkQRL28H1SeIjDUAqHR9fEUykCxr4WtG5EVU7Gkgfzuf DDWgU4m9SSGNy8Qaz56mBtfhZ7KxFfMrtca/ym2kZ8A9hcwJcK5taI996nPWVid5OF26 RcpBFxJ6lUGr8tgBwvpKJjqbpfJard+ip0x+1qRF7ZfvO3jR4uIJBF60kbJVZdNDLhzZ Ve/hW676GYXnKWlOU7N2xOSsyPsaLS//U5tY/WybxEPmIcw82loe+LgIOAqQXgTcN9Fe 0anA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=M9iU8Hx8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u11si1728025ejm.399.2021.03.05.09.54.09; Fri, 05 Mar 2021 09:54:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=M9iU8Hx8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229788AbhCERxL (ORCPT + 99 others); Fri, 5 Mar 2021 12:53:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49896 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229794AbhCERwv (ORCPT ); Fri, 5 Mar 2021 12:52:51 -0500 Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D97AFC061760 for ; Fri, 5 Mar 2021 09:52:50 -0800 (PST) Received: by mail-ed1-x52a.google.com with SMTP id x9so3806776edd.0 for ; Fri, 05 Mar 2021 09:52:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9cy6NY2NneFUb+ai21Mer/bJAl+1fOEOH5Xn9JUNG4w=; b=M9iU8Hx8FsBg3SEJvJ/21kHhWBt5rp2CgMqle7NuC5OBFVe2oGQ9SQasL3gILMCMA2 uD3OxosJLHMAEeYUlK2woG20Ck5JkBv1jdv2LNDWyOJJEp9NAgKajeSjXQnIGur7zrPI DHFKH+DwiTEZOtzsA2WF0yW4HKrGiGXqAevdSlryAMyuQyb45w7H6W8ZD+hjqAITLJrq tgNhi21v+U2FbLu4WMDpHXXLnaijE1rBsR2W1SwPWFmuMLd34ZH6GdrEK9ltgtqrqu4y u1xBnTnWTM3879W8b7j6MLhih0uRFIg2StKV+DwicGMnw7wSqm+dcs8AV9qsLKSZSqT/ ZkQg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9cy6NY2NneFUb+ai21Mer/bJAl+1fOEOH5Xn9JUNG4w=; b=TSfAF+Fd+b+EoXh3sMfLvB8KRYRgpVEs4EtcHihveoMjNMLlCI4yY85HeWwXnFOeS4 BkBZiNqrCI1LST4yCXBqPvXcZkAZcE3Zd3VKxq3XYnVr+IVRmlnvK627dDvinp1SkUgG 0qd1V5LDndPNA9hGecnSmUS/9GZbKyoZmgYzw2+NVdWujVdkoazO4vEEipMub1oRaKI7 s7ydzIf/IvMRAKe0mTr3Hq7BQ+Yo1XQhrDa0XaHrdpHDBpl4k/0DT5G3G4XxbNiM2GkQ 7tCnp9erUTMGUcejWer2qbuCM4bsLYUh5m7z4nmq+XsOEH4WiP0UCw992ie19McDuXVS CsYg== X-Gm-Message-State: AOAM533sCNh2kJXHNSv/2kA8rDzyX28SFShDhumAV9vi+YMD9ZrG9GXp TFwAk1phhVSTBewqtCsF+FSIs/prHKAEvDAD3Fr8 X-Received: by 2002:aa7:db4f:: with SMTP id n15mr10224074edt.12.1614966769368; Fri, 05 Mar 2021 09:52:49 -0800 (PST) MIME-Version: 1.0 References: <20210212163709.3139-1-nramas@linux.microsoft.com> In-Reply-To: <20210212163709.3139-1-nramas@linux.microsoft.com> From: Paul Moore Date: Fri, 5 Mar 2021 12:52:38 -0500 Message-ID: Subject: Re: [PATCH v3] selinux: measure state and policy capabilities To: Lakshmi Ramasubramanian Cc: zohar@linux.ibm.com, Stephen Smalley , tusharsu@linux.microsoft.com, tyhicks@linux.microsoft.com, casey@schaufler-ca.com, agk@redhat.com, snitzer@redhat.com, gmazyland@gmail.com, sashal@kernel.org, James Morris , linux-integrity@vger.kernel.org, selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 12, 2021 at 11:37 AM Lakshmi Ramasubramanian wrote: > > SELinux stores the configuration state and the policy capabilities > in kernel memory. Changes to this data at runtime would have an impact > on the security guarantees provided by SELinux. Measuring this data > through IMA subsystem provides a tamper-resistant way for > an attestation service to remotely validate it at runtime. > > Measure the configuration state and policy capabilities by calling > the IMA hook ima_measure_critical_data(). > > To enable SELinux data measurement, the following steps are required: > > 1, Add "ima_policy=critical_data" to the kernel command line arguments > to enable measuring SELinux data at boot time. > For example, > BOOT_IMAGE=/boot/vmlinuz-5.11.0-rc3+ root=UUID=fd643309-a5d2-4ed3-b10d-3c579a5fab2f ro nomodeset security=selinux ima_policy=critical_data > > 2, Add the following rule to /etc/ima/ima-policy > measure func=CRITICAL_DATA label=selinux > > Sample measurement of SELinux state and policy capabilities: > > 10 2122...65d8 ima-buf sha256:13c2...1292 selinux-state 696e...303b > > Execute the following command to extract the measured data > from the IMA's runtime measurements list: > > grep "selinux-state" /sys/kernel/security/integrity/ima/ascii_runtime_measurements | tail -1 | cut -d' ' -f 6 | xxd -r -p > > The output should be a list of key-value pairs. For example, > initialized=1;enforcing=0;checkreqprot=1;network_peer_controls=1;open_perms=1;extended_socket_class=1;always_check_network=0;cgroup_seclabel=1;nnp_nosuid_transition=1;genfs_seclabel_symlinks=0; > > To verify the measurement is consistent with the current SELinux state > reported on the system, compare the integer values in the following > files with those set in the IMA measurement (using the following commands): > > - cat /sys/fs/selinux/enforce > - cat /sys/fs/selinux/checkreqprot > - cat /sys/fs/selinux/policy_capabilities/[capability_file] > > Note that the actual verification would be against an expected state > and done on a separate system (likely an attestation server) requiring > "initialized=1;enforcing=1;checkreqprot=0;" > for a secure state and then whatever policy capabilities are actually > set in the expected policy (which can be extracted from the policy > itself via seinfo, for example). > > Signed-off-by: Lakshmi Ramasubramanian > Suggested-by: Stephen Smalley > Suggested-by: Paul Moore > --- > security/selinux/ima.c | 87 ++++++++++++++++++++++++++++++++-- > security/selinux/include/ima.h | 6 +++ > security/selinux/selinuxfs.c | 6 +++ > security/selinux/ss/services.c | 2 +- > 4 files changed, 96 insertions(+), 5 deletions(-) This draft seems fine to me, but there is a small logistical blocker at the moment which means I can't merge this until -rc2 is released, which likely means this coming Monday. The problem is that this patch relies on code that went upstream via in the last merge window via the IMA tree, not the SELinux tree; normally that wouldn't be a problem as I typically rebase the selinux/next to Linus' -rc1 tag once the merge window is closed, but in this particular case the -rc1 tag is dangerously broken for some system configurations (the tag has since been renamed) so I'm not rebasing onto -rc1 this time around. Assuming that -rc2 fixes the swapfile/fs-corruption problem, early next week I'll rebase selinux/next to -rc2 and merge this patch. However, if the swapfile bug continues past -rc2 we can consider merging this via the IMA tree, but I'd assume not do that if possible due to merge conflict and testing reasons. -- paul moore www.paul-moore.com