Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2162977iof; Tue, 7 Jun 2022 21:51:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyi7fxGJMsjK7+GsDT3rzLKktH8b92zewtgyrwCQkDCcUFSzah3Q5Ryq2Ruz/pZwqblaw62 X-Received: by 2002:a05:6a00:23c6:b0:51b:f8e3:2e5c with SMTP id g6-20020a056a0023c600b0051bf8e32e5cmr19766095pfc.43.1654663874401; Tue, 07 Jun 2022 21:51:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654663874; cv=none; d=google.com; s=arc-20160816; b=iNiUHteTIuvEAewUno5H7DgkNgPkDmJpDs+fsvX0XqwIQxDILQaJL8u3TfUPJWoo5x Rmsm+vM7tBLVstqNlNEVLp5Nk2sPsjFeyKZScbEhmFlmCg/JKS/7GNERk+iR0mB+MQvS n0APtL7cq4xcLNDHZSnbgmN++3nXKQFhhTplRLSJGUS8S5KP2SIBNeKebhhU11hIVtB3 lZO2YtvHb+zeAV+a6L2g3kvw637rmxlnGW/oHrl7bQg0omDbFGoxOI8eYec3jixY35Q8 kf994JuprbDXUTjKfGg1DlD2F/Ljb+8rd/i6HuJrCcT8ONsCvl0i5ZYFTK8fgWdKbra6 3EHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XAP3IjTAKYXFNWSkuVva2ACrcCw0v+/vkrCc1Ld79os=; b=n8c/TC1CQIx3pHagRlBsFgcXDhP6k+POraUZ/SEeQVBiQpb1mnS29+BdFgDpbteMZA g0mrIOeBGwyVjTLx0kB3ozn7GZPgYnzOD6AqzUjO/vwU+eUEFH9e+tyONxmeVzAmgHO0 WFF3TNuJsEMxKQwQEPX4NuSBTVAKTqZIHWnMAB4BAH6zemQThngZOD/M0OWbrNZUJgQJ 1HCjrzkzCR+zAiSN3UEOf/WzYiJjC3pO+RverfwKDkSL8goMCW30HbpvZJhLm0jQlNCe D61CeTv47j0Wty0gXUZajFvrU8o8D/kkgX18lTTbkvhcElo7mthgi/7MjZdFaOdoZDFD /vSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ZcS9IG/J"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id j9-20020a056a00130900b004fa3a8dff9dsi26666834pfu.84.2022.06.07.21.51.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 21:51:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ZcS9IG/J"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id ADF503C7E74; Tue, 7 Jun 2022 21:21:10 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1381799AbiFGVmE (ORCPT + 99 others); Tue, 7 Jun 2022 17:42:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51522 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378398AbiFGUvw (ORCPT ); Tue, 7 Jun 2022 16:51:52 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B691A200430; Tue, 7 Jun 2022 11:42:12 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9C6036168C; Tue, 7 Jun 2022 18:42:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AA5E2C385A2; Tue, 7 Jun 2022 18:42:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1654627331; bh=mTdIDoujXMOK+HqZWo1bcLLznZ0mfsHSUpSPn8Lcwd8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZcS9IG/JxxtNt9fLoQM0vLHeeGwk2M/unOA+ABDIbgOigSLItc7Y7ThDFWc0xuG4D 0PYGfBfF7vRVF7w1DNtbFBlVkY/cs6ArKibgoZCHdbgcMdXl64jEruURXXWygJNLq1 mjGkUYcWpvXEdkj0hHiep6dP+f/XYdb8AaMKAw9M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, GUO Zihua , Stable@vger.kernel.org, Mimi Zohar Subject: [PATCH 5.17 702/772] ima: remove the IMA_TEMPLATE Kconfig option Date: Tue, 7 Jun 2022 19:04:54 +0200 Message-Id: <20220607165009.735183646@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220607164948.980838585@linuxfoundation.org> References: <20220607164948.980838585@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: GUO Zihua commit 891163adf180bc369b2f11c9dfce6d2758d2a5bd upstream. The original 'ima' measurement list template contains a hash, defined as 20 bytes, and a null terminated pathname, limited to 255 characters. Other measurement list templates permit both larger hashes and longer pathnames. When the "ima" template is configured as the default, a new measurement list template (ima_template=) must be specified before specifying a larger hash algorithm (ima_hash=) on the boot command line. To avoid this boot command line ordering issue, remove the legacy "ima" template configuration option, allowing it to still be specified on the boot command line. The root cause of this issue is that during the processing of ima_hash, we would try to check whether the hash algorithm is compatible with the template. If the template is not set at the moment we do the check, we check the algorithm against the configured default template. If the default template is "ima", then we reject any hash algorithm other than sha1 and md5. For example, if the compiled default template is "ima", and the default algorithm is sha1 (which is the current default). In the cmdline, we put in "ima_hash=sha256 ima_template=ima-ng". The expected behavior would be that ima starts with ima-ng as the template and sha256 as the hash algorithm. However, during the processing of "ima_hash=", "ima_template=" has not been processed yet, and hash_setup would check the configured hash algorithm against the compiled default: ima, and reject sha256. So at the end, the hash algorithm that is actually used will be sha1. With template "ima" removed from the configured default, we ensure that the default tempalte would at least be "ima-ng" which allows for basically any hash algorithm. This change would not break the algorithm compatibility checks for IMA. Fixes: 4286587dccd43 ("ima: add Kconfig default measurement list template") Signed-off-by: GUO Zihua Cc: Signed-off-by: Mimi Zohar Signed-off-by: Greg Kroah-Hartman --- security/integrity/ima/Kconfig | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) --- a/security/integrity/ima/Kconfig +++ b/security/integrity/ima/Kconfig @@ -69,10 +69,9 @@ choice hash, defined as 20 bytes, and a null terminated pathname, limited to 255 characters. The 'ima-ng' measurement list template permits both larger hash digests and longer - pathnames. + pathnames. The configured default template can be replaced + by specifying "ima_template=" on the boot command line. - config IMA_TEMPLATE - bool "ima" config IMA_NG_TEMPLATE bool "ima-ng (default)" config IMA_SIG_TEMPLATE @@ -82,7 +81,6 @@ endchoice config IMA_DEFAULT_TEMPLATE string depends on IMA - default "ima" if IMA_TEMPLATE default "ima-ng" if IMA_NG_TEMPLATE default "ima-sig" if IMA_SIG_TEMPLATE @@ -102,19 +100,19 @@ choice config IMA_DEFAULT_HASH_SHA256 bool "SHA256" - depends on CRYPTO_SHA256=y && !IMA_TEMPLATE + depends on CRYPTO_SHA256=y config IMA_DEFAULT_HASH_SHA512 bool "SHA512" - depends on CRYPTO_SHA512=y && !IMA_TEMPLATE + depends on CRYPTO_SHA512=y config IMA_DEFAULT_HASH_WP512 bool "WP512" - depends on CRYPTO_WP512=y && !IMA_TEMPLATE + depends on CRYPTO_WP512=y config IMA_DEFAULT_HASH_SM3 bool "SM3" - depends on CRYPTO_SM3=y && !IMA_TEMPLATE + depends on CRYPTO_SM3=y endchoice config IMA_DEFAULT_HASH