Re: [GIT PULL] integrity subsystem updates for v5.4

From: Mimi Zohar
Date: Mon Sep 16 2019 - 18:13:38 EST


On Mon, 2019-09-16 at 13:38 -0700, Linus Torvalds wrote:
> On Wed, Sep 11, 2019 at 2:29 PM Mimi Zohar <zohar@xxxxxxxxxxxxx> wrote:
> >
> > The major feature in this pull request is IMA support for measuring
> > and appraising appended file signatures. In addition are a couple of
> > bug fixes and code cleanup to use struct_size().
>
> How is the file signature any different from (and/or better than) the
> fs-verity support?
>
> The fs-verity support got fairly extensively discussed, and is
> apparently going to actually be widely used by Android, and it an
> independent feature of any security model.
>
> What does the IMA version bring to the table?

IMA currently defines a system wide policy for measuring, verifying a
file's integrity (both mutable/immutable files) against known good
values, and adding audit records containing the file hashes. ÂThe
policy isn't hard coded in the kernel, allowing people/companies to
configure it as desired for their specific use case.

Support for appended signatures already exists in the kernel for
kernel modules. ÂThis pull request adds IMA support for appended
signatures in order to verify the kexec kernel image on OpenPOWER, as
part of Secure and Trusted boot enablement. ÂThis would allow distros
to sign kernel images similar to how they currently sign kernel
modules.

IMA verifies file signatures up front, before allowing access to the
file. Âfs-verity verifies the signature of the Merkle tree (and other
info), but does not verify the file data at the time of first use.
ÂThere are pros and cons to each of these approaches.

Mimi