Message ID | 86832c6adb256f29f44b6229222b80964fc8cfcc.1517314847.git.dongsu@kinvolk.io (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Hi Miklos, On Tue, 2018-01-30 at 19:06 +0100, Dongsu Park wrote: > From: Alban Crequy <alban@kinvolk.io> > > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, > re-appraised and re-audited each time. Cached integrity results should > not be used. > > It is useful in FUSE because the userspace FUSE process can change the > underlying files at any time without notifying the kernel. Both IMA-measurement and IMA-appraisal cache the integrity results and are dependent on the kernel to detect when a file changes in order to clear the cached info and force the file to be re-evaluated. This detection was dependent on i_version changing. For filesystems that do not support i_version, remote or fuse filesystems, where the kernel does not detect the file change, the file was measured and the signature evaluated just once. With commit a2a2c3c8580a ("ima: Use i_version only when filesystem supports it"), which is being upstreamed in this open window, i_version is considered an optimization. If i_version is not enabled, either because the local filesystem does not support it or the filesystem wasn't mounted with i_version, the file will now always be re-evaluated. That patch does not address FUSE or remote filesystems, as the kernel does not detect the change. Further, even if the kernel could detect the change, FUSE filesystems by definition are untrusted. The original patches addressed FUSE filesystems, by defining a new IMA policy option, forcing the file to be re-evaluated based on the filesystem magic number. All of the changes were in the IMA subsystem. These patches are the result of Christoph's comment on the original patches saying, "ima has no business looking at either the name _or_ the magic number." Your help in resolving this problem is much appreciated! Mimi > > Cc: linux-kernel@vger.kernel.org > Cc: linux-integrity@vger.kernel.org > Cc: linux-security-module@vger.kernel.org > Cc: linux-fsdevel@vger.kernel.org > Cc: Miklos Szeredi <miklos@szeredi.hu> > Cc: Alexander Viro <viro@zeniv.linux.org.uk> > Cc: Mimi Zohar <zohar@linux.vnet.ibm.com> > Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com> > Cc: James Morris <jmorris@namei.org> > Cc: Christoph Hellwig <hch@infradead.org> > Acked-by: "Serge E. Hallyn" <serge@hallyn.com> > Acked-by: Seth Forshee <seth.forshee@canonical.com> > Tested-by: Dongsu Park <dongsu@kinvolk.io> > Signed-off-by: Alban Crequy <alban@kinvolk.io> > --- > fs/fuse/inode.c | 2 +- > include/linux/fs.h | 1 + > 2 files changed, 2 insertions(+), 1 deletion(-) > > diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c > index 624f18bb..0a9e5164 100644 > --- a/fs/fuse/inode.c > +++ b/fs/fuse/inode.c > @@ -1205,7 +1205,7 @@ static void fuse_kill_sb_anon(struct super_block *sb) > static struct file_system_type fuse_fs_type = { > .owner = THIS_MODULE, > .name = "fuse", > - .fs_flags = FS_HAS_SUBTYPE, > + .fs_flags = FS_HAS_SUBTYPE | FS_IMA_NO_CACHE, > .mount = fuse_mount, > .kill_sb = fuse_kill_sb_anon, > }; > diff --git a/include/linux/fs.h b/include/linux/fs.h > index 511fbaab..ced841ba 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -2075,6 +2075,7 @@ struct file_system_type { > #define FS_BINARY_MOUNTDATA 2 > #define FS_HAS_SUBTYPE 4 > #define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */ > +#define FS_IMA_NO_CACHE 16 /* Force IMA to re-measure, re-appraise, re-audit files */ > #define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */ > struct dentry *(*mount) (struct file_system_type *, int, > const char *, void *); -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Fri, 2018-02-02 at 10:20 -0500, Mimi Zohar wrote: > Hi Miklos, > > On Tue, 2018-01-30 at 19:06 +0100, Dongsu Park wrote: > > From: Alban Crequy <alban@kinvolk.io> > > > > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, > > re-appraised and re-audited each time. Cached integrity results should > > not be used. > > > > It is useful in FUSE because the userspace FUSE process can change the > > underlying files at any time without notifying the kernel. > > Both IMA-measurement and IMA-appraisal cache the integrity results and > are dependent on the kernel to detect when a file changes in order to > clear the cached info and force the file to be re-evaluated. This > detection was dependent on i_version changing. For filesystems that > do not support i_version, remote or fuse filesystems, where the kernel > does not detect the file change, the file was measured and the > signature evaluated just once. > > With commit a2a2c3c8580a ("ima: Use i_version only when filesystem > supports it"), which is being upstreamed in this open window, > i_version is considered an optimization. If i_version is not enabled, > either because the local filesystem does not support it or the > filesystem wasn't mounted with i_version, the file will now always be > re-evaluated. > > That patch does not address FUSE or remote filesystems, as the kernel > does not detect the change. Further, even if the kernel could detect > the change, FUSE filesystems by definition are untrusted. > > The original patches addressed FUSE filesystems, by defining a new IMA > policy option, forcing the file to be re-evaluated based on the > filesystem magic number. All of the changes were in the IMA > subsystem. These patches are the result of Christoph's comment on the > original patches saying, "ima has no business looking at either the > name _or_ the magic number." > > Your help in resolving this problem is much appreciated! Meaning, can you ack the fuse flag addition so we can take the series through the IMA tree? thanks, Mimi > > > > > Cc: linux-kernel@vger.kernel.org > > Cc: linux-integrity@vger.kernel.org > > Cc: linux-security-module@vger.kernel.org > > Cc: linux-fsdevel@vger.kernel.org > > Cc: Miklos Szeredi <miklos@szeredi.hu> > > Cc: Alexander Viro <viro@zeniv.linux.org.uk> > > Cc: Mimi Zohar <zohar@linux.vnet.ibm.com> > > Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com> > > Cc: James Morris <jmorris@namei.org> > > Cc: Christoph Hellwig <hch@infradead.org> > > Acked-by: "Serge E. Hallyn" <serge@hallyn.com> > > Acked-by: Seth Forshee <seth.forshee@canonical.com> > > Tested-by: Dongsu Park <dongsu@kinvolk.io> > > Signed-off-by: Alban Crequy <alban@kinvolk.io> > > --- > > fs/fuse/inode.c | 2 +- > > include/linux/fs.h | 1 + > > 2 files changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c > > index 624f18bb..0a9e5164 100644 > > --- a/fs/fuse/inode.c > > +++ b/fs/fuse/inode.c > > @@ -1205,7 +1205,7 @@ static void fuse_kill_sb_anon(struct super_block *sb) > > static struct file_system_type fuse_fs_type = { > > .owner = THIS_MODULE, > > .name = "fuse", > > - .fs_flags = FS_HAS_SUBTYPE, > > + .fs_flags = FS_HAS_SUBTYPE | FS_IMA_NO_CACHE, > > .mount = fuse_mount, > > .kill_sb = fuse_kill_sb_anon, > > }; > > diff --git a/include/linux/fs.h b/include/linux/fs.h > > index 511fbaab..ced841ba 100644 > > --- a/include/linux/fs.h > > +++ b/include/linux/fs.h > > @@ -2075,6 +2075,7 @@ struct file_system_type { > > #define FS_BINARY_MOUNTDATA 2 > > #define FS_HAS_SUBTYPE 4 > > #define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */ > > +#define FS_IMA_NO_CACHE 16 /* Force IMA to re-measure, re-appraise, re-audit files */ > > #define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */ > > struct dentry *(*mount) (struct file_system_type *, int, > > const char *, void *); > -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Fri, Feb 2, 2018 at 4:33 PM, Mimi Zohar <zohar@linux.vnet.ibm.com> wrote: > On Fri, 2018-02-02 at 10:20 -0500, Mimi Zohar wrote: >> Hi Miklos, >> >> On Tue, 2018-01-30 at 19:06 +0100, Dongsu Park wrote: >> > From: Alban Crequy <alban@kinvolk.io> >> > >> > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, >> > re-appraised and re-audited each time. Cached integrity results should >> > not be used. >> > >> > It is useful in FUSE because the userspace FUSE process can change the >> > underlying files at any time without notifying the kernel. I don't really have an understanding what IMA is doing, I think the same thing applies to any network filesystem (i.e. ones with d_revalidate). Isn't that the case? Thanks, Miklos -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Fri, 2018-02-02 at 17:10 +0100, Miklos Szeredi wrote: > On Fri, Feb 2, 2018 at 4:33 PM, Mimi Zohar <zohar@linux.vnet.ibm.com> wrote: > > On Fri, 2018-02-02 at 10:20 -0500, Mimi Zohar wrote: > >> Hi Miklos, > >> > >> On Tue, 2018-01-30 at 19:06 +0100, Dongsu Park wrote: > >> > From: Alban Crequy <alban@kinvolk.io> > >> > > >> > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, > >> > re-appraised and re-audited each time. Cached integrity results should > >> > not be used. > >> > > >> > It is useful in FUSE because the userspace FUSE process can change the > >> > underlying files at any time without notifying the kernel. > > I don't really have an understanding what IMA is doing, I think the > same thing applies to any network filesystem (i.e. ones with > d_revalidate). > > Isn't that the case? IMA is calculating the file hash, for inclusion in the measurement list, verifying the file signature stored in the xattr, or both. For the remote filesystem case, re-calculating the file hash would be limited to inclusion in the measurement list. For FUSE, the kernel has access to the xattr, so re-calculating the file hash could also be used to re-verify the file signature. Mimi -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Fri, Feb 2, 2018 at 5:10 PM, Miklos Szeredi <miklos@szeredi.hu> wrote: > On Fri, Feb 2, 2018 at 4:33 PM, Mimi Zohar <zohar@linux.vnet.ibm.com> wrote: >> On Fri, 2018-02-02 at 10:20 -0500, Mimi Zohar wrote: >>> Hi Miklos, >>> >>> On Tue, 2018-01-30 at 19:06 +0100, Dongsu Park wrote: >>> > From: Alban Crequy <alban@kinvolk.io> >>> > >>> > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, >>> > re-appraised and re-audited each time. Cached integrity results should >>> > not be used. >>> > >>> > It is useful in FUSE because the userspace FUSE process can change the >>> > underlying files at any time without notifying the kernel. > > I don't really have an understanding what IMA is doing, I think the > same thing applies to any network filesystem (i.e. ones with > d_revalidate). > > Isn't that the case? Hi Miklos, From my limited understanding, network filesystems might need that too, yes. I don't know if there are people interested in using both IMA and network filesystems. If so, they would have to write that patch and test it. It is not a new issue, for neither network filesystems or FUSE. But I am more interested in the FUSE use case because FUSE can be mounted by unprivileged users either today with fusermount installed with setuid, or soon with the coming patches to allow FUSE mounts in a non-init user namespace. That makes the issue more visible than for network filesystems where unprivileged users cannot mount. Cheers, Alban -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tue, Jan 30, 2018 at 7:06 PM, Dongsu Park <dongsu@kinvolk.io> wrote: > From: Alban Crequy <alban@kinvolk.io> > > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, > re-appraised and re-audited each time. Cached integrity results should > not be used. > > It is useful in FUSE because the userspace FUSE process can change the > underlying files at any time without notifying the kernel. > > Cc: linux-kernel@vger.kernel.org > Cc: linux-integrity@vger.kernel.org > Cc: linux-security-module@vger.kernel.org > Cc: linux-fsdevel@vger.kernel.org > Cc: Miklos Szeredi <miklos@szeredi.hu> > Cc: Alexander Viro <viro@zeniv.linux.org.uk> > Cc: Mimi Zohar <zohar@linux.vnet.ibm.com> > Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com> > Cc: James Morris <jmorris@namei.org> > Cc: Christoph Hellwig <hch@infradead.org> > Acked-by: "Serge E. Hallyn" <serge@hallyn.com> > Acked-by: Seth Forshee <seth.forshee@canonical.com> > Tested-by: Dongsu Park <dongsu@kinvolk.io> > Signed-off-by: Alban Crequy <alban@kinvolk.io> > --- > fs/fuse/inode.c | 2 +- > include/linux/fs.h | 1 + > 2 files changed, 2 insertions(+), 1 deletion(-) > > diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c > index 624f18bb..0a9e5164 100644 > --- a/fs/fuse/inode.c > +++ b/fs/fuse/inode.c > @@ -1205,7 +1205,7 @@ static void fuse_kill_sb_anon(struct super_block *sb) > static struct file_system_type fuse_fs_type = { > .owner = THIS_MODULE, > .name = "fuse", > - .fs_flags = FS_HAS_SUBTYPE, > + .fs_flags = FS_HAS_SUBTYPE | FS_IMA_NO_CACHE, > .mount = fuse_mount, > .kill_sb = fuse_kill_sb_anon, > }; > diff --git a/include/linux/fs.h b/include/linux/fs.h > index 511fbaab..ced841ba 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -2075,6 +2075,7 @@ struct file_system_type { > #define FS_BINARY_MOUNTDATA 2 > #define FS_HAS_SUBTYPE 4 > #define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */ > +#define FS_IMA_NO_CACHE 16 /* Force IMA to re-measure, re-appraise, re-audit files */ I think it would be more logical to change the order of the patches (i.e. first patch adds this constant and the code handling it, and second patch just adds it to fuse's .fs_flags). Otherwise Acked-by: Miklos Szeredi <mszeredi@redhat.com> Thanks, Miklos > #define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */ > struct dentry *(*mount) (struct file_system_type *, int, > const char *, void *); > -- > 2.13.6 > -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wed, 2018-02-07 at 10:21 +0100, Miklos Szeredi wrote: > On Tue, Jan 30, 2018 at 7:06 PM, Dongsu Park <dongsu@kinvolk.io> wrote: > > From: Alban Crequy <alban@kinvolk.io> > > > > This new fs_type flag FS_IMA_NO_CACHE means files should be re-measured, > > re-appraised and re-audited each time. Cached integrity results should > > not be used. > > > > It is useful in FUSE because the userspace FUSE process can change the > > underlying files at any time without notifying the kernel. > > > > Cc: linux-kernel@vger.kernel.org > > Cc: linux-integrity@vger.kernel.org > > Cc: linux-security-module@vger.kernel.org > > Cc: linux-fsdevel@vger.kernel.org > > Cc: Miklos Szeredi <miklos@szeredi.hu> > > Cc: Alexander Viro <viro@zeniv.linux.org.uk> > > Cc: Mimi Zohar <zohar@linux.vnet.ibm.com> > > Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com> > > Cc: James Morris <jmorris@namei.org> > > Cc: Christoph Hellwig <hch@infradead.org> > > Acked-by: "Serge E. Hallyn" <serge@hallyn.com> > > Acked-by: Seth Forshee <seth.forshee@canonical.com> > > Tested-by: Dongsu Park <dongsu@kinvolk.io> > > Signed-off-by: Alban Crequy <alban@kinvolk.io> > > --- > > fs/fuse/inode.c | 2 +- > > include/linux/fs.h | 1 + > > 2 files changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c > > index 624f18bb..0a9e5164 100644 > > --- a/fs/fuse/inode.c > > +++ b/fs/fuse/inode.c > > @@ -1205,7 +1205,7 @@ static void fuse_kill_sb_anon(struct super_block *sb) > > static struct file_system_type fuse_fs_type = { > > .owner = THIS_MODULE, > > .name = "fuse", > > - .fs_flags = FS_HAS_SUBTYPE, > > + .fs_flags = FS_HAS_SUBTYPE | FS_IMA_NO_CACHE, > > .mount = fuse_mount, > > .kill_sb = fuse_kill_sb_anon, > > }; > > diff --git a/include/linux/fs.h b/include/linux/fs.h > > index 511fbaab..ced841ba 100644 > > --- a/include/linux/fs.h > > +++ b/include/linux/fs.h > > @@ -2075,6 +2075,7 @@ struct file_system_type { > > #define FS_BINARY_MOUNTDATA 2 > > #define FS_HAS_SUBTYPE 4 > > #define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */ > > +#define FS_IMA_NO_CACHE 16 /* Force IMA to re-measure, re-appraise, re-audit files */ > > I think it would be more logical to change the order of the patches > (i.e. first patch adds this constant and the code handling it, and > second patch just adds it to fuse's .fs_flags). > > Otherwise > > Acked-by: Miklos Szeredi <mszeredi@redhat.com> Sure, thank you! Mimi -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c index 624f18bb..0a9e5164 100644 --- a/fs/fuse/inode.c +++ b/fs/fuse/inode.c @@ -1205,7 +1205,7 @@ static void fuse_kill_sb_anon(struct super_block *sb) static struct file_system_type fuse_fs_type = { .owner = THIS_MODULE, .name = "fuse", - .fs_flags = FS_HAS_SUBTYPE, + .fs_flags = FS_HAS_SUBTYPE | FS_IMA_NO_CACHE, .mount = fuse_mount, .kill_sb = fuse_kill_sb_anon, }; diff --git a/include/linux/fs.h b/include/linux/fs.h index 511fbaab..ced841ba 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -2075,6 +2075,7 @@ struct file_system_type { #define FS_BINARY_MOUNTDATA 2 #define FS_HAS_SUBTYPE 4 #define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */ +#define FS_IMA_NO_CACHE 16 /* Force IMA to re-measure, re-appraise, re-audit files */ #define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */ struct dentry *(*mount) (struct file_system_type *, int, const char *, void *);