Re: Writing out EVM protected xattrs while EVM is active

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Oct 17, 2017 at 6:49 PM, Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx> wrote:
> On Tue, 2017-10-17 at 16:12 -0700, Matthew Garrett wrote:
>> I'm interested in extending our use of IMA digital signatures to EVM
>> in order to protect security.capability (and, in the near future,
>> security.apparmor).
>
> security.capability is already included in the EVM HMAC/signature.
> Your security.apparmor patch is now queued in my #next branch.

Ah, sorry, by "our" I meant "my specific use case", not upstream :)

>> But as far as I can tell, IMA_NEW_FILE will only
>> be set if there's an IMA action that covers the file in question. This
>> means it's possible to write out security.evm and friends on newly
>> created files that would be appraised, but not on any other files. Am
>> I missing something?
>
> Only files in the IMA policy that pass integrity verification can be
> accessed.  The IMA_NEW_FILE flag overides this restriction, allowing
> IMA to access new files, even if the security.ima xattr does not yet
> exist.

Is this accurate? If there's no IMA policy that covers the file in
question (eg, appraise is limited to a specific security context or
owner), will IMA_NEW ever be set? It looks like that codepath will
only be entered if there's a rule that matches. The EVM xattr
protections appear to be called regardless, which means that there's
then no way to write out attributes on them at runtime.



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux