From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-18.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_2 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E309C43214 for ; Wed, 28 Jul 2021 12:47:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 09E3560FC0 for ; Wed, 28 Jul 2021 12:47:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235020AbhG1Mrj (ORCPT ); Wed, 28 Jul 2021 08:47:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:46738 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234759AbhG1Mrf (ORCPT ); Wed, 28 Jul 2021 08:47:35 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2C1B360FC0; Wed, 28 Jul 2021 12:47:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627476453; bh=bjFjDZ8cI3IDSCqI1y0kJWa2EkidjrwuaHkeMMXdfSY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=CVvrUhOMARYWM5FAHXn4pAOCHUx80b85xBrVxz8ZYhhHKaobXdpz8jeT8t/kFbjCI PNw4coTw9niEVPvy25NbvwINd8CvS1n6IshhNxw+7pbCyGzCYzhdP5AulUFTUujNMV 9N3WpXnRCjr4/k5HDh/p6UjDgHIzvoqVxy7+ifdKrDYPJ0ifnuSx42tWB/L9JQyCD1 LWMzbCoyMMRQCjT4D/1rPCXn0uqRJtxuXto7ebNbAJtO1s2hQvD9LLixhDTm/IlC1y 92KaPD9glDdgpuAd+zcFjG5DjIbIAplRA6LkV/p+oNvAQPOMENHWP7SPoshVqT33x3 YXHlVrN7OpPhA== Date: Wed, 28 Jul 2021 14:47:28 +0200 From: Mauro Carvalho Chehab To: Roberto Sassu Cc: , , , , , , Subject: Re: [RFC][PATCH v2 11/12] diglim: Remote Attestation Message-ID: <20210728144728.62ace280@sal.lan> In-Reply-To: <20210726163700.2092768-12-roberto.sassu@huawei.com> References: <20210726163700.2092768-1-roberto.sassu@huawei.com> <20210726163700.2092768-12-roberto.sassu@huawei.com> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Mon, 26 Jul 2021 18:36:59 +0200 Roberto Sassu escreveu: > Add more information about remote attestation with IMA and DIGLIM in > Documentation/security/diglim/remote_attestation.rst. > > Signed-off-by: Roberto Sassu > --- > Documentation/security/diglim/index.rst | 1 + > .../security/diglim/remote_attestation.rst | 87 +++++++++++++++++++ > MAINTAINERS | 1 + > 3 files changed, 89 insertions(+) > create mode 100644 Documentation/security/diglim/remote_attestation.rst > > diff --git a/Documentation/security/diglim/index.rst b/Documentation/security/diglim/index.rst > index 4771134c2f0d..0f28c5ad71c0 100644 > --- a/Documentation/security/diglim/index.rst > +++ b/Documentation/security/diglim/index.rst > @@ -10,3 +10,4 @@ Digest Lists Integrity Module (DIGLIM) > introduction > architecture > implementation > + remote_attestation > diff --git a/Documentation/security/diglim/remote_attestation.rst b/Documentation/security/diglim/remote_attestation.rst > new file mode 100644 > index 000000000000..83fd7581c460 > --- /dev/null > +++ b/Documentation/security/diglim/remote_attestation.rst > @@ -0,0 +1,87 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +Remote Attestation > +================== > + > +When a digest list is added or deleted through the ``digest_list_add`` or > +``digest_list_del`` interfaces, its buffer is sent to the IMA function > +``ima_measure_critical_data()``. The primary reason for it is to calculate > +the buffer digest, so that the digest list itself is searchable in the hash > +table. > + > +``ima_measure_critical_data()`` can be also used to create a new > +measurement entry each time this function is called, if there is an > +appropriate rule in the IMA policy. Given that this function is called > +during an addition or deletion of a digest list, a remote verifier can > +infer from the measurement list precise information about what has been > +uploaded to the kernel. > + > +To enable this functionality, the following rule must be added to the IMA > +policy: > + > +:: As commented on other patches at this series, you can merge :: at the previous text line, e. g.: policy:: does the same as: policy: :: but it is nicer for text-only readers, IMO. > + > + measure func=CRITICAL_DATA label=diglim > + > + > +When a file is uploaded, the workflow and the resulting IMA measurement > +list are: > + > +.. code-block:: bash > + > + # echo $PWD/0-file_list-compact-cat > /sys/kernel/security/integrity/diglim/digest_list_add > + # echo $PWD/0-file_list-compact-cat > /sys/kernel/security/integrity/diglim/digest_list_del > + # cat /sys/kernel/security/integrity/ima/ascii_runtime_measurements > + ... > + 10