Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Mar 5, 2019 at 5:19 AM Mimi Zohar <zohar@xxxxxxxxxxxxx> wrote:
>
> On Mon, 2019-03-04 at 14:10 -0800, Matthew Garrett wrote:
> > I'm not clear on why requiring signed policies is helpful here. If you
> > allow FUSE mounts at all then you need to trust the FUSE filesystem to
> > return good results, in which case you can trust it to return valid
> > hashes. If you don't trust the FUSE filesystem then generating the
> > hash via read doesn't win you anything - the filesystem can return one
> > set of data on the initial IMA hashing, and then return a second set
> > later. Requiring signed policy doesn't change that.
>
> You're defining a new generic file ops "get_hash", but are using FUSE,
> a specific filesystem, as an example.  Requiring the IMA policy to be
> signed when using "get_hash", is proof of the sysadmin's agreement to
> bypass actually reading and calculating the file hash.

We can trust in-kernel filesystems to return reliable information.
Network filesystems have the same issue as FUSE - we're trusting that
the remote endpoint won't give us different information on successive
reads. What's the threat that's blocked by requiring signed policy
here?



[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux