Re: [PATCH v1 5/6] KEYS: measure queued keys
From: Mimi Zohar
Date: Wed Oct 23 2019 - 14:49:38 EST
On Wed, 2019-10-23 at 13:52 -0400, Mimi Zohar wrote:
> On Wed, 2019-10-23 at 10:34 -0700, Lakshmi Ramasubramanian wrote:
> > On 10/23/19 6:23 AM, Mimi Zohar wrote:
> > > The ordering of this patch set is awkward. ÂIt should first introduce
> > > a generic method for measuring keys based on the keyring. ÂThen add
> > > the additional support needed for the specific builtin_trusted_keys
> > > keyring usecase.
> > Would the following ordering of the patch set be acceptable:
> > => PATCH 0/5: Cover letter
> > => PATCH 1/5: Define the enum "hook(BUILTIN_TRUSTED_KEYS)" in ima.h
> > => PATCH 2/5: Define ima hook
> > This will initially do nothing if ima is not yet
> > initialized.
> > Call process_buffer_measurement() if ima is initialized.
> > => PATCH 3/5: key_create_or_update change and the call to ima hook
> > => PATCH 4/5: Queue\De-Queue of key measurement requests.
> > Enable queuing of key in the ima hook if ima is not
> > initialized.
> > => PATCH 5/5: ima policy to enable measurement of keys which will
> > enable end-to-end working of this feature.
> The first patches need to introduce the generic concept of measuring
> keys based on policy. ÂOnly afterwards would you add any builtin
> trusted keyring specific code.
1. Extend the IMA policy language to support identifying keyrings
2. Define a new IMA hook which calls process_buffer_measurement()
3. Call the new IMA hook (eg. from post_key_create_or_update)
4. Define an early workqueue for saving keys loaded prior to IMA is
initialized. Â(Remember we don't hard code policy in the kernel.)
I'll be pushing out linux-integrity shortly. ÂFor the time being,
please base your patches on -rc3.