[PATCH v1 5/6] KEYS: measure queued keys
Mimi Zohar
zohar at linux.ibm.com
Wed Oct 23 18:49:25 UTC 2019
On Wed, 2019-10-23 at 13:52 -0400, Mimi Zohar wrote:
> On Wed, 2019-10-23 at 10:34 -0700, Lakshmi Ramasubramanian wrote:
> > On 10/23/19 6:23 AM, Mimi Zohar wrote:
> >
> > > The ordering of this patch set is awkward. It should first introduce
> > > a generic method for measuring keys based on the keyring. Then add
> > > the additional support needed for the specific builtin_trusted_keys
> > > keyring usecase.
> >
> > Would the following ordering of the patch set be acceptable:
> >
> > => PATCH 0/5: Cover letter
> >
> > => PATCH 1/5: Define the enum "hook(BUILTIN_TRUSTED_KEYS)" in ima.h
> >
> > => PATCH 2/5: Define ima hook
> > This will initially do nothing if ima is not yet
> > initialized.
> > Call process_buffer_measurement() if ima is initialized.
> >
> > => PATCH 3/5: key_create_or_update change and the call to ima hook
> >
> > => PATCH 4/5: Queue\De-Queue of key measurement requests.
> > Enable queuing of key in the ima hook if ima is not
> > initialized.
> >
> > => PATCH 5/5: ima policy to enable measurement of keys which will
> > enable end-to-end working of this feature.
>
> The first patches need to introduce the generic concept of measuring
> keys based on policy. Only afterwards would you add any builtin
> trusted keyring specific code.
1. Extend the IMA policy language to support identifying keyrings
2. Define a new IMA hook which calls process_buffer_measurement()
3. Call the new IMA hook (eg. from post_key_create_or_update)
4. Define an early workqueue for saving keys loaded prior to IMA is
initialized. (Remember we don't hard code policy in the kernel.)
I'll be pushing out linux-integrity shortly. For the time being,
please base your patches on -rc3.
thanks,
Mimi
More information about the Linux-security-module-archive
mailing list