Received: by 2002:ab2:620c:0:b0:1ef:ffd0:ce49 with SMTP id o12csp489556lqt; Mon, 18 Mar 2024 13:58:38 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUUXOeYTtOCbes3kz1pBzKcOR21DCH2IP7Oe5uYLK1Au8xL3ox+BPRs90aI/5ofPdNTroT+UhRIbC0QVCBj6UE7vDtCChztJbb07LCD3g== X-Google-Smtp-Source: AGHT+IGcBtWHldwpTmp7Sz/tKIYe4xvo05kGLV0fUoBECk35fzy37niM1pwfjDbYcnqPR+8YvnXc X-Received: by 2002:a17:90a:f68e:b0:29f:83e9:69ea with SMTP id cl14-20020a17090af68e00b0029f83e969eamr774114pjb.11.1710795518112; Mon, 18 Mar 2024 13:58:38 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710795518; cv=pass; d=google.com; s=arc-20160816; b=hg+hcz2zyzSgi550sXdF96iyx8bdnIAb1R4A4qXqNVhkYvXEAtWgWjkwV5uHqi2YLx Q9DAbVVJpbtfaJRxUHUOqyOp9HBwDueV6QenoDWBX8ictDZsRNPfWbC5LHe/CsZGird/ TKLo2MjD/r5CdWQxSwWNBTDnHuIKd3pmRjwkZcfAlqrqiNFRErXZ1cOM1OgMilFEDQW+ 20gYznDjnnOlNjdRgxLmBPGkwJBBCuNKsMH3ct7pIdGMF/320gUp1+6W2yfQXlcbasgg PIvKnATrX+gmpl8EKvVzynG27Cu2aeVMaVZ4zld//Gec+R2D296vbEGsCV9UTs9NSM+W Upfg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature :dkim-filter; bh=VwjmcstDx+NgU9BBFPDxpbqSu2gppqDHoUWpsVz/Th0=; fh=FLN0AXZSnnqzjzdYxzvKI9lV0I2PV/tILc1CPnHxnaE=; b=QAzuEqMF0C9EWELGpkS60QGdKXfewIOrgXu6PcqgOwH8TnaNYbKfXOA3VuYWxox9Zj PsIT3MAj8TRiBmgo9G2NS+BAiBRBbXwfjQz73lWq/Oq5X6ks8+tgVR+2D3u/TL6pcu11 VuGrVVwZrFaq8SwRPBHn/GPYXRSZJMWGHJYl9X0+dyjTUkN5+BRdOpxXDG7D7RqEg3l0 etwaigccM/DJqa/gKAu7Vj+5mWcYM6krqFtf+88R+R0SCpVh5BEM64UTz6WMr4+7e//n IwwfvHlpGa6E89bPiLNwYjrCWqurEko478L/QHpxLDfJklwBvUwMYqG75nMFsv0GUF9W HGng==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=onnCPRbH; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-106657-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-106657-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id x89-20020a17090a6c6200b0029c798bd1f4si8923566pjj.1.2024.03.18.13.58.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Mar 2024 13:58:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-106657-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=onnCPRbH; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-106657-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-106657-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id C7090282B04 for ; Mon, 18 Mar 2024 20:58:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C00D05821B; Mon, 18 Mar 2024 20:58:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b="onnCPRbH" Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8CA3443AA3; Mon, 18 Mar 2024 20:58:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=13.77.154.182 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710795506; cv=none; b=qkk7EF87iB6TKPXcS0KX/mtxUZv/FQMdMldPGmw0Nddc+vQTfpwlcuvb/E1qXr10xJIZVxZyj26xAqBkyK0OLidD2Fnob3yzdSWZ/zBf/TAfNP8fYFaVZzvBSQ8OSRwcDGqYS3mwhS2eqfJ9s858dGeKRDKN9jFznh2fzQl/lXQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710795506; c=relaxed/simple; bh=iBeE7+uw1+a5Vgld1wKCLp+1aV7VFk9n2FjdtnYxOC8=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=G0nTymvf2sb3R/jblFnKttfCRmvQ+ZcOyf1hOgFOmVrSWVSAlIY4E9KowAPupOgrPUndqyYxkjtmzHNHiv0ZICy1fGSW7ggtFnFbDSZtP6kX7z7/qUvHtTid7uMFYghK99ZvaWKOCqJrif91pOFPYzen4xyY3Wu7y9nP4X6MDn8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com; spf=pass smtp.mailfrom=linux.microsoft.com; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b=onnCPRbH; arc=none smtp.client-ip=13.77.154.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.microsoft.com Received: from [10.137.106.151] (unknown [167.220.2.23]) by linux.microsoft.com (Postfix) with ESMTPSA id E7B8820B74C0; Mon, 18 Mar 2024 13:58:23 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com E7B8820B74C0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1710795504; bh=VwjmcstDx+NgU9BBFPDxpbqSu2gppqDHoUWpsVz/Th0=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=onnCPRbHf1Ctws2/MdDiXWRWVU/AtpyiqTCWaP9IGfzEKNsiBab2QiD70n2xNWdiE +iMmKlhUXXPx2YJll5Q9m9B6+1hqBB2jN6iRC/N/plU/BbpF12cOc5b4kBRfN/EhVJ FocQoZ2pW//0/MyUBBIDG10lyLap3A58o8x5R6ow= Message-ID: <02453956-46d0-40f4-9e20-1bb0808996bb@linux.microsoft.com> Date: Mon, 18 Mar 2024 13:58:23 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider Content-Language: en-CA To: Roberto Sassu , Eric Biggers Cc: corbet@lwn.net, zohar@linux.ibm.com, jmorris@namei.org, serge@hallyn.com, tytso@mit.edu, axboe@kernel.dk, agk@redhat.com, snitzer@kernel.org, eparis@redhat.com, paul@paul-moore.com, linux-doc@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, fsverity@lists.linux.dev, linux-block@vger.kernel.org, dm-devel@lists.linux.dev, audit@vger.kernel.org, linux-kernel@vger.kernel.org, Deven Bowers References: <1710560151-28904-1-git-send-email-wufan@linux.microsoft.com> <1710560151-28904-19-git-send-email-wufan@linux.microsoft.com> <20240318051703.GB63337@sol.localdomain> <53a067f80db2e53ae29dc811515ab51c6ef86aed.camel@huaweicloud.com> From: Fan Wu In-Reply-To: <53a067f80db2e53ae29dc811515ab51c6ef86aed.camel@huaweicloud.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 3/18/2024 1:08 AM, Roberto Sassu wrote: > On Sun, 2024-03-17 at 22:17 -0700, Eric Biggers wrote: >> On Fri, Mar 15, 2024 at 08:35:48PM -0700, Fan Wu wrote: >>> +config IPE_PROP_FS_VERITY >>> + bool "Enable property for fs-verity files" >>> + depends on FS_VERITY && FS_VERITY_BUILTIN_SIGNATURES >>> + help >>> + This option enables the usage of properties "fsverity_signature" >>> + and "fsverity_digest". These properties evaluate to TRUE when >>> + a file is fsverity enabled and with a signed digest >> >> Again: why would anyone care if there is a signature, if that signature is not >> checked. >> >> I think you meant to write something like: "when a file is fsverity enabled and >> has a valid builtin signature whose signing cert is in the .fs-verity keyring". > > I was also thinking the same. I didn't follow the recent development > closely, but unless IPE locks somehow the .fs-verity keyring, the > property you suggested would not be immutable. Meaning that someone can > add/remove a key in that keyring, making the property true or false. > > Roberto Yes, the .fs-verity keyring's mutability could affect the property's immutability. However, we are not planing to "lock" the keyrings, but we would like to use policies languages to express what certificate can be trusted. For example, we can have a rule like this: #Certificate declaration CERTIFICATE=MyCertificate CertThumbprint=DummyThumbprint op=EXECUTE fsverity_signature=MyCertificate action=ALLOW This will be our immediate next work after the initial version is accepted. -Fan