aboutsummaryrefslogtreecommitdiffstats
path: root/security/integrity
diff options
context:
space:
mode:
authorRoberto Sassu <roberto.sassu@polito.it>2013-06-07 06:16:29 -0400
committerMimi Zohar <zohar@linux.vnet.ibm.com>2013-10-25 17:17:04 -0400
commitadf53a778a0a5a5dc9103509da4a9719046e5310 (patch)
tree2c5298965f79c48194481ad3b6ad9f1a3ab84a2c /security/integrity
parent7bc5f447ce9d01e19394b5399bf1a4fcebf0f8dd (diff)
ima: new templates management mechanism
The original 'ima' template is fixed length, containing the filedata hash and pathname. The filedata hash is limited to 20 bytes (md5/sha1). The pathname is a null terminated string, limited to 255 characters. To overcome these limitations and to add additional file metadata, it is necessary to extend the current version of IMA by defining additional templates. The main reason to introduce this feature is that, each time a new template is defined, the functions that generate and display the measurement list would include the code for handling a new format and, thus, would significantly grow over time. This patch set solves this problem by separating the template management from the remaining IMA code. The core of this solution is the definition of two new data structures: a template descriptor, to determine which information should be included in the measurement list, and a template field, to generate and display data of a given type. To define a new template field, developers define the field identifier and implement two functions, init() and show(), respectively to generate and display measurement entries. Initially, this patch set defines the following template fields (support for additional data types will be added later):  - 'd': the digest of the event (i.e. the digest of a measured file),         calculated with the SHA1 or MD5 hash algorithm;  - 'n': the name of the event (i.e. the file name), with size up to         255 bytes;  - 'd-ng': the digest of the event, calculated with an arbitrary hash            algorithm (field format: [<hash algo>:]digest, where the digest            prefix is shown only if the hash algorithm is not SHA1 or MD5);  - 'n-ng': the name of the event, without size limitations. Defining a new template descriptor requires specifying the template format, a string of field identifiers separated by the '|' character. This patch set defines the following template descriptors:  - "ima": its format is 'd|n';  - "ima-ng" (default): its format is 'd-ng|n-ng' Further details about the new template architecture can be found in Documentation/security/IMA-templates.txt. Changelog: - don't defer calling ima_init_template() - Mimi - don't define ima_lookup_template_desc() until used - Mimi - squashed with documentation patch - Mimi Signed-off-by: Roberto Sassu <roberto.sassu@polito.it> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'security/integrity')
-rw-r--r--security/integrity/ima/Makefile2
-rw-r--r--security/integrity/ima/ima.h29
-rw-r--r--security/integrity/ima/ima_init.c4
-rw-r--r--security/integrity/ima/ima_template.c112
4 files changed, 146 insertions, 1 deletions
diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile
index 56dfee7cbf61..7fe4ae37dbea 100644
--- a/security/integrity/ima/Makefile
+++ b/security/integrity/ima/Makefile
@@ -6,5 +6,5 @@
6obj-$(CONFIG_IMA) += ima.o 6obj-$(CONFIG_IMA) += ima.o
7 7
8ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 8ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
9 ima_policy.o 9 ima_policy.o ima_template.o
10ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 10ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h
index da03d3389619..c85718f1f623 100644
--- a/security/integrity/ima/ima.h
+++ b/security/integrity/ima/ima.h
@@ -36,12 +36,39 @@ enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 };
36#define IMA_HASH_BITS 9 36#define IMA_HASH_BITS 9
37#define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS) 37#define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS)
38 38
39#define IMA_TEMPLATE_FIELD_ID_MAX_LEN 16
40#define IMA_TEMPLATE_NUM_FIELDS_MAX 15
41
39/* set during initialization */ 42/* set during initialization */
40extern int ima_initialized; 43extern int ima_initialized;
41extern int ima_used_chip; 44extern int ima_used_chip;
42extern int ima_hash_algo; 45extern int ima_hash_algo;
43extern int ima_appraise; 46extern int ima_appraise;
44 47
48/* IMA template field data definition */
49struct ima_field_data {
50 u8 *data;
51 u32 len;
52};
53
54/* IMA template field definition */
55struct ima_template_field {
56 const char field_id[IMA_TEMPLATE_FIELD_ID_MAX_LEN];
57 int (*field_init) (struct integrity_iint_cache *iint, struct file *file,
58 const unsigned char *filename,
59 struct ima_field_data *field_data);
60 void (*field_show) (struct seq_file *m, enum ima_show_type show,
61 struct ima_field_data *field_data);
62};
63
64/* IMA template descriptor definition */
65struct ima_template_desc {
66 char *name;
67 char *fmt;
68 int num_fields;
69 struct ima_template_field **fields;
70};
71
45/* IMA inode template definition */ 72/* IMA inode template definition */
46struct ima_template_data { 73struct ima_template_data {
47 u8 digest[IMA_DIGEST_SIZE]; /* sha1/md5 measurement hash */ 74 u8 digest[IMA_DIGEST_SIZE]; /* sha1/md5 measurement hash */
@@ -79,6 +106,8 @@ void ima_add_violation(struct file *file, const unsigned char *filename,
79 const char *op, const char *cause); 106 const char *op, const char *cause);
80int ima_init_crypto(void); 107int ima_init_crypto(void);
81 108
109int ima_init_template(void);
110
82/* 111/*
83 * used to protect h_table and sha_table 112 * used to protect h_table and sha_table
84 */ 113 */
diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c
index 50e15e6336c4..f84aec5412f3 100644
--- a/security/integrity/ima/ima_init.c
+++ b/security/integrity/ima/ima_init.c
@@ -99,6 +99,10 @@ int __init ima_init(void)
99 rc = ima_init_crypto(); 99 rc = ima_init_crypto();
100 if (rc) 100 if (rc)
101 return rc; 101 return rc;
102 rc = ima_init_template();
103 if (rc != 0)
104 return rc;
105
102 ima_add_boot_aggregate(); /* boot aggregate must be first entry */ 106 ima_add_boot_aggregate(); /* boot aggregate must be first entry */
103 ima_init_policy(); 107 ima_init_policy();
104 108
diff --git a/security/integrity/ima/ima_template.c b/security/integrity/ima/ima_template.c
new file mode 100644
index 000000000000..7e86783ccf51
--- /dev/null
+++ b/security/integrity/ima/ima_template.c
@@ -0,0 +1,112 @@
1/*
2 * Copyright (C) 2013 Politecnico di Torino, Italy
3 * TORSEC group -- http://security.polito.it
4 *
5 * Author: Roberto Sassu <roberto.sassu@polito.it>
6 *
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License as
9 * published by the Free Software Foundation, version 2 of the
10 * License.
11 *
12 * File: ima_template.c
13 * Helpers to manage template descriptors.
14 */
15#include "ima.h"
16
17static struct ima_template_desc defined_templates[] = {
18};
19
20static struct ima_template_field supported_fields[] = {
21};
22
23static struct ima_template_field *ima_lookup_template_field(
24 const char *field_id)
25{
26 int i;
27
28 for (i = 0; i < ARRAY_SIZE(supported_fields); i++)
29 if (strncmp(supported_fields[i].field_id, field_id,
30 IMA_TEMPLATE_FIELD_ID_MAX_LEN) == 0)
31 return &supported_fields[i];
32 return NULL;
33}
34
35static int ima_template_fmt_size(char *template_fmt)
36{
37 char c;
38 int template_fmt_len = strlen(template_fmt);
39 int i = 0, j = 0;
40
41 while (i < template_fmt_len) {
42 c = template_fmt[i];
43 if (c == '|')
44 j++;
45 i++;
46 }
47
48 return j + 1;
49}
50
51static int template_desc_init_fields(char *template_fmt,
52 struct ima_template_field ***fields,
53 int *num_fields)
54{
55 char *c, *template_fmt_ptr = template_fmt;
56 int template_num_fields = ima_template_fmt_size(template_fmt);
57 int i, result = 0;
58
59 if (template_num_fields > IMA_TEMPLATE_NUM_FIELDS_MAX)
60 return -EINVAL;
61
62 *fields = kzalloc(template_num_fields * sizeof(*fields), GFP_KERNEL);
63 if (*fields == NULL) {
64 result = -ENOMEM;
65 goto out;
66 }
67 for (i = 0; (c = strsep(&template_fmt_ptr, "|")) != NULL &&
68 i < template_num_fields; i++) {
69 struct ima_template_field *f = ima_lookup_template_field(c);
70
71 if (!f) {
72 result = -ENOENT;
73 goto out;
74 }
75 (*fields)[i] = f;
76 }
77 *num_fields = i;
78 return 0;
79out:
80 kfree(*fields);
81 *fields = NULL;
82 return result;
83}
84
85static int init_defined_templates(void)
86{
87 int i = 0;
88 int result = 0;
89
90 /* Init defined templates. */
91 for (i = 0; i < ARRAY_SIZE(defined_templates); i++) {
92 struct ima_template_desc *template = &defined_templates[i];
93
94 result = template_desc_init_fields(template->fmt,
95 &(template->fields),
96 &(template->num_fields));
97 if (result < 0)
98 return result;
99 }
100 return result;
101}
102
103int ima_init_template(void)
104{
105 int result;
106
107 result = init_defined_templates();
108 if (result < 0)
109 return result;
110
111 return 0;
112}