Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D0F4BC636CD for ; Sat, 4 Feb 2023 05:39:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230118AbjBDFjh (ORCPT ); Sat, 4 Feb 2023 00:39:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44732 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229449AbjBDFje (ORCPT ); Sat, 4 Feb 2023 00:39:34 -0500 Received: from wind.enjellic.com (wind.enjellic.com [76.10.64.91]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 0A3F723C7B for ; Fri, 3 Feb 2023 21:39:32 -0800 (PST) Received: from wind.enjellic.com (localhost [127.0.0.1]) by wind.enjellic.com (8.15.2/8.15.2) with ESMTP id 3145cmjc010476; Fri, 3 Feb 2023 23:38:48 -0600 Received: (from greg@localhost) by wind.enjellic.com (8.15.2/8.15.2/Submit) id 3145clRD010475; Fri, 3 Feb 2023 23:38:47 -0600 Date: Fri, 3 Feb 2023 23:38:46 -0600 From: "Dr. Greg" To: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, xen-devel@lists.xen.org, linux-sgx@vger.kernel.org, tboot-devel@lists.sourceforge.net Cc: paul@paul-moore.com, casey@schaufler-ca.com, corbet@lwn.net Subject: Quixote/TSEM: A new security architecture and eco-system for Linux. Message-ID: <20230204053846.GA10404@wind.enjellic.com> Reply-To: "Dr. Greg" Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.4i X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.2.3 (wind.enjellic.com [127.0.0.1]); Fri, 03 Feb 2023 23:38:49 -0600 (CST) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Good evening, I hope the week has gone well for everyone. On behalf of the Quixote team: Izzy the Golden Retriever, Maria, John and myself; I am pleased to announce the initial release of the Quixote/TSEM Trust Orchestration System. We believe it uniquely positions Linux to demonstrate a new approach to security and security co-processor architectures. Quixote/TSEM is based on the notion, that like all other physical phenomenon, the security state of a platform or workload can be mathematically modeled. The objective is to provide for Linux security what Docker did for Linux namespace technology. There are two major components to this architecture. TSEM is the Trusted Security Event Modeling system. It is a new Linux Security Module implementation, that at a conceptual level, is a blending of integrity measurement and mandatory access controls. It treats the LSM hooks as the basis set for a functional description of the security state of a system. Quixote is the userspace software stack that makes the TSEM LSM useful. It implements the concept of a Trust Orchestration System (TOS). A trust orchestration environment is designed to keep a platform or workload in a known trust state. It thus implements the notion of prospective trust rather than the retrospective trust model available with TPM based architectures. A patch series implementing the TSEM LSM has been submitted to the linux-security-module list for review and inclusion in the upstream kernel. The source code for the Quixote TOS and pre-compiled binaries for the userspace tooling can be found at the following URL: ftp://ftp.enjellic.com/pub/Quixote The source release includes a selection of TMA's that include Xen, SGX and micro-controller implementations. The kernel patches include a documentation file, that we believe, thoroughly discusses the rationale and implementation of the new architecture. To avoid further indemnifying my reputation for loquaciousness in e-mail, I will defer interested parties to that document for further discussion. The document is also included in the Quixote source code release for those who choose to download that. In addition to initiating a discussion on a different approach to security, we hope that this release keeps Casey Schaufler from turning more blue than he already is. Given that I had mentioned to him two months ago that a new LSM would become available, "in a couple of weeks", that may influence conversations on changes to the Linux LSM architecture that are being discussed. Such is the state of software development.... :-) I would be more than happy to field any additional questions that may be forthcoming. Best wishes for a pleasant weekend. As always, Dr. Greg The Quixote Project - Flailing at the Travails of Cybersecurity