ocfs2-devel.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Roberto Sassu via Ocfs2-devel <ocfs2-devel@oss.oracle.com>
To: Mimi Zohar <zohar@linux.ibm.com>,
	mark@fasheh.com, jlbec@evilplan.org, joseph.qi@linux.alibaba.com,
	dmitry.kasatkin@gmail.com, paul@paul-moore.com,
	jmorris@namei.org, serge@hallyn.com,
	stephen.smalley.work@gmail.com, eparis@parisplace.org,
	casey@schaufler-ca.com
Cc: nicolas.bouchinet@clip-os.org, keescook@chromium.org,
	selinux@vger.kernel.org, Roberto Sassu <roberto.sassu@huawei.com>,
	reiserfs-devel@vger.kernel.org, linux-kernel@vger.kernel.org,
	linux-security-module@vger.kernel.org,
	linux-integrity@vger.kernel.org, ocfs2-devel@oss.oracle.com
Subject: Re: [Ocfs2-devel] [PATCH v7 6/6] evm: Support multiple LSMs	providing an xattr
Date: Mon, 20 Feb 2023 10:49:37 +0100	[thread overview]
Message-ID: <ab9245bfb43b96fd8eded8a4ca25f5cae20b9f04.camel@huaweicloud.com> (raw)
In-Reply-To: <1f252850086a39e3c15736f252600d388f6b9c24.camel@linux.ibm.com>

On Sun, 2023-02-19 at 14:42 -0500, Mimi Zohar wrote:
> On Thu, 2022-12-01 at 11:41 +0100, Roberto Sassu wrote:
> > From: Roberto Sassu <roberto.sassu@huawei.com>
> > 
> > Currently, evm_inode_init_security() processes a single LSM xattr from
> > the array passed by security_inode_init_security(), and calculates the
> > HMAC on it and other inode metadata.
> > 
> > Given that initxattrs() callbacks, called by
> > security_inode_init_security(), expect that this array is terminated when
> > the xattr name is set to NULL, reuse the same assumption to scan all xattrs
> > and to calculate the HMAC on all of them.
> > 
> > Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
> > Reviewed-by: Casey Schaufler <casey@schaufler-ca.com>
> 
> Normally changing the contents of the EVM HMAC calculation would break
> existing systems.  Assuming for the time being this is safe, at what
> point will it affect backwards compatability?  Should it be documented
> now or then?

Actually, the current patch set continues to fullfill user space
expectation on the EVM behavior. If the LSM infrastructure created more
xattrs and EVM calculated the HMAC on just one, there would be a
problem on subsequent xattr operations and on IMA verification.

By updating both the LSM infrastructure and EVM to support multiple
xattrs, everything will continue to work.

Thanks

Roberto


_______________________________________________
Ocfs2-devel mailing list
Ocfs2-devel@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/ocfs2-devel

  reply	other threads:[~2023-02-20  9:50 UTC|newest]

Thread overview: 31+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-12-01 10:41 [Ocfs2-devel] [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes Roberto Sassu via Ocfs2-devel
2022-12-01 10:41 ` [Ocfs2-devel] [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security() Roberto Sassu via Ocfs2-devel
2023-02-17 19:47   ` Mimi Zohar via Ocfs2-devel
2022-12-01 10:41 ` [Ocfs2-devel] [PATCH v7 2/6] ocfs2: " Roberto Sassu via Ocfs2-devel
2023-01-10  8:55   ` Roberto Sassu via Ocfs2-devel
2023-01-12 17:21     ` Paul Moore via Ocfs2-devel
2023-02-08 14:33       ` Roberto Sassu via Ocfs2-devel
2023-02-09 21:05         ` Paul Moore via Ocfs2-devel
2023-02-21  6:45     ` Joseph Qi via Ocfs2-devel
2023-02-21  7:51       ` Roberto Sassu via Ocfs2-devel
2023-02-17 19:51   ` Mimi Zohar via Ocfs2-devel
2023-02-17 21:30     ` Mimi Zohar via Ocfs2-devel
2023-02-20  9:27       ` Roberto Sassu via Ocfs2-devel
2023-02-20 11:08         ` Mimi Zohar via Ocfs2-devel
2023-02-20 12:20           ` Roberto Sassu via Ocfs2-devel
2023-02-20 12:40             ` Mimi Zohar via Ocfs2-devel
2023-02-20  8:34     ` Roberto Sassu via Ocfs2-devel
2022-12-01 10:41 ` [Ocfs2-devel] [PATCH v7 3/6] security: Remove security_old_inode_init_security() Roberto Sassu via Ocfs2-devel
2023-02-19 19:41   ` Mimi Zohar via Ocfs2-devel
2022-12-01 10:41 ` [Ocfs2-devel] [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook Roberto Sassu via Ocfs2-devel
2023-02-20 12:43   ` Mimi Zohar via Ocfs2-devel
2022-12-01 10:41 ` [Ocfs2-devel] [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure Roberto Sassu via Ocfs2-devel
2023-02-19 19:41   ` Mimi Zohar via Ocfs2-devel
2022-12-01 10:41 ` [Ocfs2-devel] [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr Roberto Sassu via Ocfs2-devel
2023-02-19 19:42   ` Mimi Zohar via Ocfs2-devel
2023-02-20  9:49     ` Roberto Sassu via Ocfs2-devel [this message]
2023-02-20 10:56       ` Mimi Zohar via Ocfs2-devel
2023-01-12 17:15 ` [Ocfs2-devel] [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes Paul Moore via Ocfs2-devel
2023-01-13 10:35   ` Roberto Sassu via Ocfs2-devel
2023-03-08 22:16 ` Paul Moore via Ocfs2-devel
2023-03-09  7:53   ` Roberto Sassu via Ocfs2-devel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ab9245bfb43b96fd8eded8a4ca25f5cae20b9f04.camel@huaweicloud.com \
    --to=ocfs2-devel@oss.oracle.com \
    --cc=casey@schaufler-ca.com \
    --cc=dmitry.kasatkin@gmail.com \
    --cc=eparis@parisplace.org \
    --cc=jlbec@evilplan.org \
    --cc=jmorris@namei.org \
    --cc=joseph.qi@linux.alibaba.com \
    --cc=keescook@chromium.org \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=mark@fasheh.com \
    --cc=nicolas.bouchinet@clip-os.org \
    --cc=paul@paul-moore.com \
    --cc=reiserfs-devel@vger.kernel.org \
    --cc=roberto.sassu@huawei.com \
    --cc=roberto.sassu@huaweicloud.com \
    --cc=selinux@vger.kernel.org \
    --cc=serge@hallyn.com \
    --cc=stephen.smalley.work@gmail.com \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).