Re: Enabling EVM on NFS mounts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On May 21, 2018, at 6:28 PM, Chuck Lever <chuck.lever@xxxxxxxxxx> wrote:
> 
> I'm in the middle of rewriting
> 
> https://datatracker.ietf.org/doc/draft-cel-nfsv4-linux-seclabel-xtensions/
> 
> which was recently rejected by the nfsv4 Working Group for
> plausible and fixable reasons. They like the idea, but my
> proposal for using NFSv4 security labels is not workable
> even as an experiment.
> 
> As I compose a fresh Internet-Draft I'm trying to understand
> what an EVM HMAC covers, and I found this:
> 
> http://linux-ima.sourceforge.net/evmctl.1.html
> 
>> EVM protects file metadata by including following attributes into HMAC and signature calculation: inode number, inode generation, UID, GID, file mode, security.selinux, security.SMACK64, security.ima, security.capability.
> 
>> EVM HMAC and signature may also include additional file and file system attributes. Currently supported additional attributes are filesystem UUID and extra SMACK extended attributes.
> 
> 
> The computation of the IMA HMAC is straightforward, but it
> appears that the EVM HMAC is evolving, and not all of the
> input items would necessarily be visible to remote EVM
> consumers.
> 
> Is there any way an NFS client would be able to tell exactly
> what attributes were used to compute an EVM hash, and what
> should it do if the whole input set is not available for
> verification?
> 
> Amongst the security. xattrs, I believe only security.selinux
> is currently exposed via NFS. Thus an NFS client EVM would
> see only that particular xattr and not others by which it can
> compute or verify the EVM hash.
> 
> Does the inclusion here of "security.capability" mean that NFS
> support for EVM and for file capabilities are inseparable? Is
> the content of security.capability in a binary or human-readable
> format?
> 
> Filesystem attributes such as a UUID, type, or disk label might
> not be visible to NFS clients.
> 
> Would there be any reason to protect ACLs with the EVM hash?

I've submitted a replacement document for 

https://datatracker.ietf.org/doc/draft-cel-nfsv4-linux-seclabel-xtensions/

Please see:

https://datatracker.ietf.org/doc/draft-ietf-nfsv4-integrity-measurement/

The following changes have been made since linux-seclabel-xtensions:

- The original personal draft has been promoted to a Working Group
document. There were no objections from members of the WG to
taking this work. The WG will meet at IETF 102 in July and I
intend to discuss this work with them at that time.

- Support for Linux file capabilities has been removed. I plan to
submit a separate Internet-Draft that specifies capabilities
support, once nfsv4-integrity-measurement is under way.

- The use of NFSv4 Security Labels has been replaced with new
OPTIONAL fattr4 attributes. The document includes an XDR definition
of the new attributes. The document is now organized like RFC 8275.

- To address the issues I raised earlier in this thread, support has
been added for EVM HMAC hashes covering optional extended attributes.
The server advertises a per-filesystem list of which optional
attributes are included in EVM HMAC hashes.

- The discussion is more sensitive to servers that support storing
hashes but do not permit native access to them (ie., non-Linux
NFSv4.2 server implementations).

- The Security Considerations section has been expanded.


--
Chuck Lever







[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux