Received: by 2002:ab2:7b86:0:b0:1f7:5705:b850 with SMTP id q6csp288391lqh; Sat, 4 May 2024 01:04:47 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWamoJ0uknnC3oriiUcRGBAW7FTnijpxsRKjxoD2IFwI0tirJmrDKY8An00j/cogwZoKAoxtpPwmonUPCG2RiY8u/x9cl5z70b54jjkgg== X-Google-Smtp-Source: AGHT+IG6MVtnmYn0K9EOQdk9B9a16+Ha/wE6pNVzn2fE2BxD5207n0IkuexGw3XxkD1Q5+8x1vwi X-Received: by 2002:a05:622a:454:b0:43a:a8ad:7954 with SMTP id o20-20020a05622a045400b0043aa8ad7954mr5127284qtx.28.1714809886771; Sat, 04 May 2024 01:04:46 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714809886; cv=pass; d=google.com; s=arc-20160816; b=vOSLs/5Ad1RbI+m17CtW7qMIDVkA+lMKWsl2epKpaAHyhvYzi5aCOMw3Pu2EBnQcwy yhaWMW3mmdXg+R0BY7LrwWAhOH0ac0rkb4AD02M3x6T1JhMh/9SgcE0UhWNpohZfYToG KnPbE2Euayqtnkx7w9+xRo5mZObg++4BPuqtByw9LzJE0ruz+T57vXlSdSMVxNjJx68U oi1F3Cp3d1OIkhoF8o6swHtK2CvWMvQEka7XT9wE3o8P2eF847Q8TLsqxRIfhXczNaWD vULIOwVcRBj0qMmEURgdRqChvgT+TAxo6UrDZ6fvTeHe0zPykZMkDv3QkQLrvqgzShWw aoEQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=3Lj67rtK1QueWPk7ARNpfvxl9vOgAVWGxhUJDN/QBK8=; fh=wuh+YC9aFgnJAJHmppu6odtaYYp5hD5YtlrUluzYnBE=; b=DQTWFROLYWl/CRmipr8xZcuY/FXhhJ+TC40mXats/jR1s9qefkhjFTSKKdZ2/9Tx2q jD6nlypcJsTVArmuKazn4rklKDAc+/7iVSfif9kLbGh3Yd1nRRKTh8G8uB0HdeJqsiSC gR+DBHtVMN6TfPsiSRJ3qNL7IilJeafeKtG21Yewjb5fvK0NSopPhlWulEfC6u/uNCMJ 9niYHjUAgUNimrnuWAa1gF4cvCvAKWy7OYFEG3Dc+EqSDSyXPlRUqXefJquwsQBTtJEt 3ydZGceIcsCK2+Jbef511cedaGSQLNj0MEvst61AVUiYMHJ1r2m+eGr94Z04ljTA4PbH WX0g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=j2MPtTQT; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-168546-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-168546-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id c19-20020ac85a93000000b0043adbe754d9si4971634qtc.453.2024.05.04.01.04.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 04 May 2024 01:04:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-168546-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=j2MPtTQT; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-168546-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-168546-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 57EB21C211D4 for ; Sat, 4 May 2024 08:04:46 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 161E012E48; Sat, 4 May 2024 08:04:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="j2MPtTQT" Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 33DBAD29E; Sat, 4 May 2024 08:04:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.180 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714809869; cv=none; b=Kgr6DSAxNcEM/nEoRD2/QLhSsYbECiMri96BOozGV7tN3HGyv8wGorBCI7HAGhKx7mus9nBLyWP5f61ittUmXfgWzi1O+XGEeGwjP4+IbcJagDMri18JaUNFKGrRvzqtu62Xn7vpnxd4k+x/74nWEbuUPE+Phbt+XJ0YBNd28P4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714809869; c=relaxed/simple; bh=0hjZIw2e2IuhjYNugxhXSXZpWs5mVXjcsoZo1BqocAs=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Ue9HDOTCe4j4gjig2I5kW18f3muEpv7ofXLBCkNYbB+0QclQdB4Cqx+eop9AdV3RyWRFpTdcWx/hovEZz0DGnnly0O+dp/E/hyfNkHqbhF6gqEH+hxpPwJh4LQ2YdtrCYJ1fktZT8a1VC0wZEcHeFt1FNVkC2KBVRpp2QD+bw9w= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=j2MPtTQT; arc=none smtp.client-ip=209.85.210.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-6ed3cafd766so391268b3a.0; Sat, 04 May 2024 01:04:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714809866; x=1715414666; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=3Lj67rtK1QueWPk7ARNpfvxl9vOgAVWGxhUJDN/QBK8=; b=j2MPtTQTx683nJWgf+VqG/CYiRVqskw/qKRynsLET/BuZX8Gx+lRoPor2Mbw77E/rs f5PVcoklIFNoWE1RWFO5kyJxadfxcHOe93vboEbFAAR6eo1eO/Ojiu2xD1/ZLSYQgZVD dNBAFTYTp+S45ULOfx3Gb5TClMgKwPE6cUWd7KZraDaORWL3p+Zu4h2Su3ynomL8e6LD 79/LzoGjVid/dmXwbAQMJIMFL9s8a6R+onCZxCrYzATbVGNaXht4nt62YZv976Bw3bOt EQNcwi76REG8VUUY9c9FJC931NWCEBwxuZVEH7Oz07377xVwvG8hfW/mnCrYjJr9GJoR WQBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714809866; x=1715414666; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=3Lj67rtK1QueWPk7ARNpfvxl9vOgAVWGxhUJDN/QBK8=; b=W/9dzpS/lLFJLoXjFbPJnwnrRBB4BRKasFPORn58kgupW5I6D2nCxYpPxGmsIaEBQ/ PgY/W+6LNNYNdgRqp7v3k2CR83+eGtgJTjNL77EfWHiWBN1pc1qhf/+AGirZ+T/CkmhJ 23TCkpvDGFZGJl0INYpBO2/VkZjI5Ft891YCX9AiugpNjGDGYKSFjDWXdlvInlGm5lIr Ou6KaBBVBXAWwT4JJXzpetcQJjwfholBX+SSc1b8LI1NZ2FDbMlhn16orvoQphinZw57 ZB4aZZRCK9notumSDPq1TB3cvs/AkeVebzZ5RPwVtir/PGa1Y9mIjImT4WDg40m0NFyl dRWA== X-Forwarded-Encrypted: i=1; AJvYcCXgXjfzAGqpZFd8V4eQ7FPaIReB6gBfvQp8Pd21tKLo97WCvi5PjVJncQsXy6aHX9EbG0gJX3OAOaeVkZASF5jbPRjbPc63YWcIDdDVXt5rBQmW/ax84o4AtD5yKzeFZolBzn0o2zsibhxLWZiVFoOnQopXNZqcLaMvGukLzVACXXbzAspKWKC3paLYd9go/Kp7hR05ZqZsLt3OHf+RuHfN1Klrw0BKRJses52aGIXYnWI6ceZpCiNLDwef7gWtZmENw0R3nBWbLg== X-Gm-Message-State: AOJu0YzESvWpYvlndTA/zG1moIQZJ9Zm1Gq3mrp1V9ezJtQHJ0V+o+7t QQ9MI9lwRe27O8mBR6TVZsbkUDrvwJgRwCE4y/Q2XQuESGNMvOcB X-Received: by 2002:a05:6a00:a81:b0:6f3:e9bc:7ed3 with SMTP id b1-20020a056a000a8100b006f3e9bc7ed3mr5704824pfl.17.1714809866257; Sat, 04 May 2024 01:04:26 -0700 (PDT) Received: from archie.me ([103.124.138.155]) by smtp.gmail.com with ESMTPSA id bn12-20020a056a00324c00b006edd05e3751sm4356202pfb.176.2024.05.04.01.04.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 04 May 2024 01:04:25 -0700 (PDT) Received: by archie.me (Postfix, from userid 1000) id 8A4001847D504; Sat, 04 May 2024 15:04:22 +0700 (WIB) Date: Sat, 4 May 2024 15:04:22 +0700 From: Bagas Sanjaya To: Fan Wu , corbet@lwn.net, zohar@linux.ibm.com, jmorris@namei.org, serge@hallyn.com, tytso@mit.edu, ebiggers@kernel.org, axboe@kernel.dk, agk@redhat.com, snitzer@kernel.org, eparis@redhat.com, paul@paul-moore.com Cc: linux-doc@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, fsverity@lists.linux.dev, linux-block@vger.kernel.org, dm-devel@lists.linux.dev, audit@vger.kernel.org, linux-kernel@vger.kernel.org, Deven Bowers Subject: Re: [PATCH v18 20/21] Documentation: add ipe documentation Message-ID: References: <1714775551-22384-1-git-send-email-wufan@linux.microsoft.com> <1714775551-22384-21-git-send-email-wufan@linux.microsoft.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="nK/4++6p9aVBG6jQ" Content-Disposition: inline In-Reply-To: <1714775551-22384-21-git-send-email-wufan@linux.microsoft.com> --nK/4++6p9aVBG6jQ Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, May 03, 2024 at 03:32:30PM -0700, Fan Wu wrote: > +IPE does not mitigate threats arising from malicious but authorized > +developers (with access to a signing certificate), or compromised > +developer tools used by them (i.e. return-oriented programming attacks). > +Additionally, IPE draws hard security boundary between userspace and > +kernelspace. As a result, IPE does not provide any protections against a > +kernel level exploit, and a kernel-level exploit can disable or tamper > +with IPE's protections. So how to mitigate kernel-level exploits then? > +Allow only initramfs > +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > ... > +Allow any signed and validated dm-verity volume and the initramfs > +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > ... htmldocs build reports new warnings: Documentation/admin-guide/LSM/ipe.rst:694: WARNING: Title underline too sho= rt. Allow any signed and validated dm-verity volume and the initramfs ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Documentation/admin-guide/LSM/ipe.rst:694: WARNING: Title underline too sho= rt. Allow any signed and validated dm-verity volume and the initramfs ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Documentation/arch/x86/resctrl.rst:577: WARNING: Title underline too short. I have to match these sections underline length: ---- >8 ---- diff --git a/Documentation/admin-guide/LSM/ipe.rst b/Documentation/admin-gu= ide/LSM/ipe.rst index 1a3bf1d8aa23f0..a47e14e024a90d 100644 --- a/Documentation/admin-guide/LSM/ipe.rst +++ b/Documentation/admin-guide/LSM/ipe.rst @@ -681,7 +681,7 @@ Allow all DEFAULT action=3DALLOW =20 Allow only initramfs -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +~~~~~~~~~~~~~~~~~~~~ =20 :: =20 @@ -691,7 +691,7 @@ Allow only initramfs op=3DEXECUTE boot_verified=3DTRUE action=3DALLOW =20 Allow any signed and validated dm-verity volume and the initramfs -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =20 :: =20 @@ -725,7 +725,7 @@ Allow only a specific dm-verity volume op=3DEXECUTE dmverity_roothash=3Dsha256:401fcec5944823ae12f62726e818440= 7a5fa9599783f030dec146938 action=3DALLOW =20 Allow any fs-verity file with a valid built-in signature -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =20 :: =20 @@ -735,7 +735,7 @@ Allow any fs-verity file with a valid built-in signature op=3DEXECUTE fsverity_signature=3DTRUE action=3DALLOW =20 Allow execution of a specific fs-verity file -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =20 :: =20 > +Additional Information > +---------------------- > + > +- `Github Repository `_ > +- Documentation/security/ipe.rst Link title to both this admin-side and developer docs can be added for disambiguation (to avoid confusion on readers): ---- >8 ---- diff --git a/Documentation/admin-guide/LSM/ipe.rst b/Documentation/admin-gu= ide/LSM/ipe.rst index a47e14e024a90d..25b17e11559149 100644 --- a/Documentation/admin-guide/LSM/ipe.rst +++ b/Documentation/admin-guide/LSM/ipe.rst @@ -7,7 +7,8 @@ Integrity Policy Enforcement (IPE) =20 This is the documentation for admins, system builders, or individuals attempting to use IPE. If you're looking for more developer-focused - documentation about IPE please see Documentation/security/ipe.rst + documentation about IPE please see :doc:`the design docs + `. =20 Overview -------- @@ -748,7 +749,7 @@ Additional Information ---------------------- =20 - `Github Repository `_ -- Documentation/security/ipe.rst +- :doc:`Developer and design docs for IPE ` =20 FAQ --- diff --git a/Documentation/security/ipe.rst b/Documentation/security/ipe.rst index 07e3632241285d..fd1b1a852d2165 100644 --- a/Documentation/security/ipe.rst +++ b/Documentation/security/ipe.rst @@ -7,7 +7,7 @@ Integrity Policy Enforcement (IPE) - Kernel Documentation =20 This is documentation targeted at developers, instead of administrators. If you're looking for documentation on the usage of IPE, please see - Documentation/admin-guide/LSM/ipe.rst + `IPE admin guide `_. =20 Historical Motivation --------------------- Thanks. --=20 An old man doll... just what I always wanted! - Clara --nK/4++6p9aVBG6jQ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYKAB0WIQSSYQ6Cy7oyFNCHrUH2uYlJVVFOowUCZjXsAgAKCRD2uYlJVVFO o5rXAQCS3HwJg98sIZ+dvHD4EtrdQXP2AZQEC3nP+kq7cOi47wD+P0ZrOINzS3p5 azRTQTXUkE+0lznZFyE75YeW2OX1dQs= =ebwU -----END PGP SIGNATURE----- --nK/4++6p9aVBG6jQ--