From: Eric Snowberg <eric.snowberg@oracle.com> To: zohar@linux.ibm.com, dmitry.kasatkin@gmail.com, jmorris@namei.org, serge@hallyn.com Cc: dhowells@redhat.com, geert@linux-m68k.org, gregkh@linuxfoundation.org, nayna@linux.ibm.com, eric.snowberg@oracle.com, tglx@linutronix.de, bauerman@linux.ibm.com, mpe@ellerman.id.au, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 0/2] ima: uncompressed module appraisal support Date: Thu, 6 Feb 2020 11:42:24 -0500 [thread overview] Message-ID: <20200206164226.24875-1-eric.snowberg@oracle.com> (raw) When booting with either "ima_policy=secure_boot module.sig_enforce=1" or building a kernel with CONFIG_IMA_ARCH_POLICY and booting with "ima_policy=secure_boot", module loading behaves differently based on if the module is compressed or not. Originally when appraising a module with ima it had to be uncompressed and ima signed. Recent changes in 5.4 have allowed internally signed modules to load [1]. But this only works if the internally signed module is compressed. The uncompressed module that is internally signed must still be ima signed. This patch series tries to bring the two in line. I'm sending this as an RFC in case this was done intentionally. Or maybe there is another way around this problem? I also realize the uncompressed module will be verified again with module_sig_check. I'm open to suggestions on improvement if this is seen as a problem. [1] https://patchwork.kernel.org/cover/10986023 Eric Snowberg (2): ima: Implement support for uncompressed module appended signatures ima: Change default secure_boot policy to include appended signatures security/integrity/digsig.c | 9 +++++++-- security/integrity/ima/ima_appraise.c | 3 +++ security/integrity/ima/ima_policy.c | 4 ++-- security/integrity/integrity.h | 3 ++- 4 files changed, 14 insertions(+), 5 deletions(-) -- 2.18.1
next reply other threads:[~2020-02-06 16:43 UTC|newest] Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-02-06 16:42 Eric Snowberg [this message] 2020-02-06 16:42 ` [RFC PATCH 1/2] ima: Implement support for uncompressed module appended signatures Eric Snowberg 2020-02-06 17:07 ` Lakshmi Ramasubramanian 2020-02-06 17:30 ` Eric Snowberg 2020-02-06 18:05 ` Mimi Zohar 2020-02-06 19:01 ` Eric Snowberg 2020-02-06 19:10 ` Mimi Zohar 2020-02-06 16:42 ` [RFC PATCH 2/2] ima: Change default secure_boot policy to include " Eric Snowberg 2020-02-06 20:22 ` [RFC PATCH 0/2] ima: uncompressed module appraisal support Nayna 2020-02-06 21:40 ` Eric Snowberg 2020-02-07 14:51 ` Mimi Zohar 2020-02-07 16:57 ` Eric Snowberg 2020-02-07 17:40 ` Mimi Zohar 2020-02-07 17:49 ` Eric Snowberg 2020-02-07 18:28 ` Mimi Zohar 2020-02-07 18:45 ` Eric Snowberg 2020-02-07 18:54 ` Mimi Zohar 2020-02-07 21:38 ` Eric Snowberg 2020-02-08 23:43 ` Mimi Zohar 2020-02-10 16:34 ` Eric Snowberg 2020-02-10 17:09 ` Mimi Zohar 2020-02-10 19:24 ` Eric Snowberg 2020-02-10 20:33 ` Mimi Zohar 2020-02-11 17:33 ` Eric Snowberg 2020-02-12 14:04 ` Nayna 2020-02-13 15:32 ` Eric Snowberg
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20200206164226.24875-1-eric.snowberg@oracle.com \ --to=eric.snowberg@oracle.com \ --cc=bauerman@linux.ibm.com \ --cc=dhowells@redhat.com \ --cc=dmitry.kasatkin@gmail.com \ --cc=geert@linux-m68k.org \ --cc=gregkh@linuxfoundation.org \ --cc=jmorris@namei.org \ --cc=linux-integrity@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=mpe@ellerman.id.au \ --cc=nayna@linux.ibm.com \ --cc=serge@hallyn.com \ --cc=tglx@linutronix.de \ --cc=zohar@linux.ibm.com \ --subject='Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).