On Tue, Mar 5, 2019 at 11:51 AM Mimi Zohar <zohar@xxxxxxxxxxxxx> wrote: > On Tue, 2019-03-05 at 10:39 -0800, Matthew Garrett wrote: > > We can trust in-kernel filesystems to return reliable information. > > Network filesystems have the same issue as FUSE - we're trusting that > > the remote endpoint won't give us different information on successive > > reads. What's the threat that's blocked by requiring signed policy > > here? > > Today, IMA calculates the file hash by reading the file. If > "get_hash" is a generic filesystem ops, then any filesystem could > implement it, properly or not. sysadmins shouldn't have to review > kernel code to understand the source of the file hash, but should be > able to assume that unless they explicitly authorize "get_hash" usage, > IMA reads the file and calculates the file hash. But what's the threat? If an attacker is in a position to inject additional IMA policy then in general they're already in a position to violate other security assumptions. Admins who have a threat model that includes an attacker being able to do this are already requiring signed policy. What's the threat that requiring signed policy for this specific option mitigates?