Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2023-12-21 at 15:38 +0100, Enrico Bravi wrote:
> Hi Mimi,
> 
> thank you for your feedback.
> 
> On 19/12/23 21:54, Mimi Zohar wrote:
> > Hi Enrico,
> > 
> > On Thu, 2023-12-14 at 15:51 +0100, Enrico Bravi wrote:
> >> The purpose of this patch is to add the possibility to configure the hash
> >> algorithm to use when calculating the template-hash.
> > 
> > The patch description should be written in the imperative mood.  For an
> > explanation, please refer to "Describe your changes" in
> > Documentation/process/submitting-patches.rst.>
> > For example:
> > 
> > The second field of the IMA measurement list, the template data hash,
> > contains a fixed sized SHA1 digest.  Add support to replace the SHA1
> > digest with other hash algorithms.  For backwards compatability, only
> > the new larger digests will be prefixed with ...
> > 
> >> The ima_template_hash command line parameter has been introduced to enable
> >> this configuration.
> > 
> > The term "ima_template_hash" could be misconstrued to refer to the hash
> > algorithm used to calculate the file digest.  To differentiate between
> > the hash algorithm used to calculate the file digest, the term
> > 'ima_template_data_hash' is longer, but I think clearer.
> 
> Yes you're right, this name is ambiguous.
> 
> >> The entry will contain the hash_algo_name before the actual template-hash,
> >> separated by a colon (:).
> > 
> > This chnage will break existing userspace applications, unless the SHA1
> > digest isn't prefixed.
> 
> Yes, in the current patch, this value is present even in the case of SHA1. We
> can modifying the patch by omitting it in the case of SHA1; as an alternative,
> the addition of the hash algorithm information can be made configurable in the
> ima log to maintain backward compatibility with existing applications.

After thinking about this some more, I realized that we didn't discuss
carrying the measurement list across kexec.   How will the kexec'ed
kernel be able to differentiate between the original and new
measurement list?   Neither the Kconfig nor making SHA1 backwards
compatible address this.   How will attestation servers be able to
differentiate between the two logs?

Obviously the new measurement list with larger digests won't be
backwards compatible. Can we support carrying the original measurement
list across kexec to a new kernel?

As long we're making changes to the IMA measurement list, we should
mention that we could include multiple digests, but I don't think it is
necessary.

> >> An example of the resulting ima log is the following:
> >>
> >> 10 sha256:64326[...]25313 ima-ng sha1:5fc9b[...]974e6 boot_aggregate
> >> 10 sha256:afd64[...]e3123 ima-ng sha1:5a493[...]f9566 /init
> >> 10 sha256:99329[...]a6353 ima-ng sha1:8c87d[...]3d8c7 /usr/bin/sh
> >> 10 sha256:a16ad[...]2ac0e ima-ng sha1:59d4b[...]330b0 /etc/ld.so.cache

The template DATA_FMT_DIGEST_WITH_ALGO field is a composite field
defined as <hash algo> + ':' + '\0' + digest.   The above ascii display
looks like the template composite field, but isn't.  It is two separate
fields.  Perhaps it should look differently as well.   Consider instead
of a string use the hash_algo value (include/uapi/linux/hash_info.h).

binary measurement log:  <pcr> <hash_algo> <digest_len> <digest>

-- 
thanks,

Mimi





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux