From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:53906 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753926AbdLGPIv (ORCPT ); Thu, 7 Dec 2017 10:08:51 -0500 Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vB7F4ArU030785 for ; Thu, 7 Dec 2017 10:08:50 -0500 Received: from e06smtp15.uk.ibm.com (e06smtp15.uk.ibm.com [195.75.94.111]) by mx0b-001b2d01.pphosted.com with ESMTP id 2eq66snyjd-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 07 Dec 2017 10:08:49 -0500 Received: from localhost by e06smtp15.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 7 Dec 2017 15:08:45 -0000 Subject: Re: [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook From: Mimi Zohar To: Jeff Layton , Christoph Hellwig , Al Viro Cc: Jan Kara , linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-integrity Date: Thu, 07 Dec 2017 10:08:40 -0500 In-Reply-To: <1512658216.1350.16.camel@redhat.com> References: <1502904620-20075-1-git-send-email-zohar@linux.vnet.ibm.com> <1502904620-20075-3-git-send-email-zohar@linux.vnet.ibm.com> <1512649584.1350.14.camel@redhat.com> <1512657359.3527.49.camel@linux.vnet.ibm.com> <1512658216.1350.16.camel@redhat.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Message-Id: <1512659320.3527.53.camel@linux.vnet.ibm.com> Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Thu, 2017-12-07 at 09:50 -0500, Jeff Layton wrote: > On Thu, 2017-12-07 at 09:35 -0500, Mimi Zohar wrote: > > Hi Jeff, > > > > [The IMA/EVM and the TPM mailing lists have been combined as a single > > linux-integrity mailing list.] > > > > On Thu, 2017-12-07 at 07:26 -0500, Jeff Layton wrote: > > > Sorry for the late review. I just started dusting off my i_version > > > rework, and noticed that IMA still has unaddressed problems here. > > > > > > > > > Personally, I'm not a huge fan of this scheme. It seems quite invasive, > > > and doesn't really seem to address the stated problem well. > > > > A cleaned up version of this patch set was meant to follow the > > introduction of a new integrity_read method, but that patch set was > > rejected. At this point, I have no intentions of upstreaming a > > cleaned up version this patch set either. > > > > > The warning itself seems ok, but I don't really see what's wrong with > > > performing remeasurement when the mtime changes on filesystems that > > > don't have SB_I_VERSION set. Surely that's better than limiting it to an > > > initial measurement? > > > > > > Maybe I just don't understand what you're really trying to achieve here. > > > > Based on discussions with Sascha Hauer, he convinced me the i_version > > test is basically just a performance improvement and posted a patch > > that checks the filesystem for i_version support, before relying on it > > - https://www.spinics.net/lists/linux-integrity/msg00033.html. > > > > Mimi > > > > Thanks for the link. That patch looks good to me. Any idea when and if > it will be merged? Is that an Ack?  Barring any testing issues, I'll upstream it with yours in the next open window. Mimi From mboxrd@z Thu Jan 1 00:00:00 1970 From: zohar@linux.vnet.ibm.com (Mimi Zohar) Date: Thu, 07 Dec 2017 10:08:40 -0500 Subject: [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook In-Reply-To: <1512658216.1350.16.camel@redhat.com> References: <1502904620-20075-1-git-send-email-zohar@linux.vnet.ibm.com> <1502904620-20075-3-git-send-email-zohar@linux.vnet.ibm.com> <1512649584.1350.14.camel@redhat.com> <1512657359.3527.49.camel@linux.vnet.ibm.com> <1512658216.1350.16.camel@redhat.com> Message-ID: <1512659320.3527.53.camel@linux.vnet.ibm.com> To: linux-security-module@vger.kernel.org List-Id: linux-security-module.vger.kernel.org On Thu, 2017-12-07 at 09:50 -0500, Jeff Layton wrote: > On Thu, 2017-12-07 at 09:35 -0500, Mimi Zohar wrote: > > Hi Jeff, > > > > [The IMA/EVM and the TPM mailing lists have been combined as a single > > linux-integrity mailing list.] > > > > On Thu, 2017-12-07 at 07:26 -0500, Jeff Layton wrote: > > > Sorry for the late review. I just started dusting off my i_version > > > rework, and noticed that IMA still has unaddressed problems here. > > > > > > > > > Personally, I'm not a huge fan of this scheme. It seems quite invasive, > > > and doesn't really seem to address the stated problem well. > > > > A cleaned up version of this patch set was meant to follow the > > introduction of a new integrity_read method, but that patch set was > > rejected. At this point, I have no intentions of upstreaming a > > cleaned up version this patch set either. > > > > > The warning itself seems ok, but I don't really see what's wrong with > > > performing remeasurement when the mtime changes on filesystems that > > > don't have SB_I_VERSION set. Surely that's better than limiting it to an > > > initial measurement? > > > > > > Maybe I just don't understand what you're really trying to achieve here. > > > > Based on discussions with Sascha Hauer, he convinced me the i_version > > test is basically just a performance improvement and posted a patch > > that checks the filesystem for i_version support, before relying on it > > - https://www.spinics.net/lists/linux-integrity/msg00033.html. > > > > Mimi > > > > Thanks for the link. That patch looks good to me. Any idea when and if > it will be merged? Is that an Ack? ?Barring any testing issues, I'll upstream it with yours in the next open window. Mimi -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:55858 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754398AbdLGPIw (ORCPT ); Thu, 7 Dec 2017 10:08:52 -0500 Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vB7F51Zn106147 for ; Thu, 7 Dec 2017 10:08:51 -0500 Received: from e06smtp15.uk.ibm.com (e06smtp15.uk.ibm.com [195.75.94.111]) by mx0b-001b2d01.pphosted.com with ESMTP id 2eq71ybdy2-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 07 Dec 2017 10:08:50 -0500 Received: from localhost by e06smtp15.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 7 Dec 2017 15:08:45 -0000 Subject: Re: [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook From: Mimi Zohar To: Jeff Layton , Christoph Hellwig , Al Viro Cc: Jan Kara , linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-integrity Date: Thu, 07 Dec 2017 10:08:40 -0500 In-Reply-To: <1512658216.1350.16.camel@redhat.com> References: <1502904620-20075-1-git-send-email-zohar@linux.vnet.ibm.com> <1502904620-20075-3-git-send-email-zohar@linux.vnet.ibm.com> <1512649584.1350.14.camel@redhat.com> <1512657359.3527.49.camel@linux.vnet.ibm.com> <1512658216.1350.16.camel@redhat.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Message-Id: <1512659320.3527.53.camel@linux.vnet.ibm.com> Sender: linux-integrity-owner@vger.kernel.org List-ID: On Thu, 2017-12-07 at 09:50 -0500, Jeff Layton wrote: > On Thu, 2017-12-07 at 09:35 -0500, Mimi Zohar wrote: > > Hi Jeff, > > > > [The IMA/EVM and the TPM mailing lists have been combined as a single > > linux-integrity mailing list.] > > > > On Thu, 2017-12-07 at 07:26 -0500, Jeff Layton wrote: > > > Sorry for the late review. I just started dusting off my i_version > > > rework, and noticed that IMA still has unaddressed problems here. > > > > > > > > > Personally, I'm not a huge fan of this scheme. It seems quite invasive, > > > and doesn't really seem to address the stated problem well. > > > > A cleaned up version of this patch set was meant to follow the > > introduction of a new integrity_read method, but that patch set was > > rejected. At this point, I have no intentions of upstreaming a > > cleaned up version this patch set either. > > > > > The warning itself seems ok, but I don't really see what's wrong with > > > performing remeasurement when the mtime changes on filesystems that > > > don't have SB_I_VERSION set. Surely that's better than limiting it to an > > > initial measurement? > > > > > > Maybe I just don't understand what you're really trying to achieve here. > > > > Based on discussions with Sascha Hauer, he convinced me the i_version > > test is basically just a performance improvement and posted a patch > > that checks the filesystem for i_version support, before relying on it > > - https://www.spinics.net/lists/linux-integrity/msg00033.html. > > > > Mimi > > > > Thanks for the link. That patch looks good to me. Any idea when and if > it will be merged? Is that an Ack? Barring any testing issues, I'll upstream it with yours in the next open window. Mimi