On 15-10-21 07:22:58, Mimi Zohar wrote:
> On Wed, 2015-10-21 at 11:50 +0100, David Howells wrote:
> > Mimi Zohar <zo...@linux.vnet.ibm.com> wrote:
> > 
> > > Thinking about the blacklist keyring some more...
> > 
> > Are we talking about a blacklist keyring that userspace can use - or can it 
> > be only usable by the kernel?
> 
> The blacklist is referenced by the kernel before using a key on either the 
> .ima or the new .ima_mok keyring to validate a file signature.
> 
> > > My concern is more that keys can be added and removed at run time from 
> > > either of the .ima or the ima_mok keyrings.  The need for a blacklist 
> > > keyring is to prevent the key from being removed and at a later point 
> > > re-added.  Unfortunately, keys can be added and removed similarly from 
> > > the 
> > > blacklist keyring as well.  Unless keys can be added, without the ability 
> > > of removing them, I'm not sure of the benefit of a blacklist keyring.  I 
> > > assume adding and removing keys requires the same write privilege.
> > 
> > The operations that modify the contents of a keyring in some way (link, 
> > unlink, clear) all operate under Write privilege.  That said, we could add 
> > a 
> > flag that suppresses unlink and clear on a keyring.  This could also 
> > suppress garbage collection of revoked and invalidated keys.
> 
> Adding the semantics at the keyring level would be better than at the 
> individual key level.  This new flag would prevent keys on the blacklist from 
> being removed.  I like this solution.

Err, what if the key's end-of-life is reached?  Revoked or not, it should go.  
This is more of a question rather than a statement.


cheers,
Petko
--
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to