Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753354Ab1EaMFS (ORCPT ); Tue, 31 May 2011 08:05:18 -0400 Received: from e33.co.us.ibm.com ([32.97.110.151]:50705 "EHLO e33.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751368Ab1EaMFQ (ORCPT ); Tue, 31 May 2011 08:05:16 -0400 Subject: Re: [PATCH v5 00/21] EVM From: Mimi Zohar To: Pavel Machek Cc: David Safford , Casey Schaufler , Andrew Morton , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, James Morris , Greg KH , Dmitry Kasatkin In-Reply-To: <20110529065818.GA2122@elf.ucw.cz> References: <1305557115-15652-1-git-send-email-zohar@linux.vnet.ibm.com> <20110518172552.6d482c7a.akpm@linux-foundation.org> <20110526060842.GA13933@localhost.ucw.cz> <4DDE80FE.7010005@schaufler-ca.com> <1306433514.24986.26.camel@localhost.localdomain> <20110526183849.GA4563@ucw.cz> <1306439347.3092.89.camel@localhost.localdomain> <20110526201725.GC15959@elf.ucw.cz> <1306518351.24986.102.camel@localhost.localdomain> <20110529065818.GA2122@elf.ucw.cz> Content-Type: text/plain; charset="UTF-8" Date: Tue, 31 May 2011 08:05:08 -0400 Message-ID: <1306843508.3181.94.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 (2.30.3-1.fc13) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3312 Lines: 83 On Sun, 2011-05-29 at 08:58 +0200, Pavel Machek wrote: > On Fri 2011-05-27 13:45:51, David Safford wrote: > > On Thu, 2011-05-26 at 22:17 +0200, Pavel Machek wrote: > > > > > I suggest you explain the patchset in the emails, then? Everyone here > > > seems to be confused... Attack it protects against, and what kind of > > > hardware is needed for the protection to be effective? > > > > The white paper is over 15 pages, and it barely scratches the surface. > > Every customer has different security threat models and requirements. > > Discussing this in general on the mailing list is really hard. > > > > So let's try to simplify this just down to digital signatures in > > the cellphone environment, as you state: > > Good. > > > > Because AFAICT, file signatures, as proposed, are only useful for > > > locking down my cellphone against myself. (That's -- evil). > > > > The proposed digital signatures can enforce authenticity of a file's > > data (IMA-Appraisal with Digital Signature), and of a file's metadata > > (EVM with Digital Signature). For most users, enforcing authenticity > > of files is a good thing - a user knows that they are running authentic > > software signed by their phone manufacturer, and not malicious files > > that they, or someone else installed. In this threat model, EVM is > > Ok, so lets talk about smartphone, similar to my HTC Dream (developer > version, unlocked bootloader, flashable from kernel (*)). > > Yes, I could install the crazy EVM/IMA infastructure to prevent > applications modifying selected files. > > But... I could just do chattr +i on selected files, I do not need > fancy EVM/IMA for that. For files that you don't expect to change, such as ELF executables, you probably could use the immutable flag, but using a digital signature provides authenticity as well, which the immutable flag does not provide. > > Blocking signature verification would serve only to punish Linux > > users who care about the authenticity of their files, while doing > > _nothing_ to stop manufacturers from locking their bootloaders. > > chattr already protects authenticity of my files, as do standard unix > permissions. > > So... where's the difference? > Pavel Neither digital signatures nor the immutable flag work for files that change, such as config files. For these files, ima-appraisal would store a file hash. > (*) but it does not change anything. > > True; determined attacker could steal my cellphone, open it up, > desolder the flash, and change attributes of the filesystem. With EVM, assuming that i_flag is included in the EVM HMAC, which it currently isn't, you would be able to detect the change and prevent the file from being accessed. > > But... the same determined attacker can also replace > bootloader&kernel&filesystem -- that is in the same flash! -- with > unlocked versions. So the argumentation is the same for locked down > phone. > As EVM is not involved in the boot process, it can not and does not address this, but other technologies could. thanks, Mimi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/