Received: by 10.223.185.111 with SMTP id b44csp452076wrg; Fri, 9 Mar 2018 07:41:20 -0800 (PST) X-Google-Smtp-Source: AG47ELtXZ9T0nMNcQQfoUgaRgQrZ+AoWBgovcrjk5qWmtvi08GZehXkOgMERFWPNONZBAWos0aPS X-Received: by 10.98.9.130 with SMTP id 2mr30552759pfj.149.1520610080048; Fri, 09 Mar 2018 07:41:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520610080; cv=none; d=google.com; s=arc-20160816; b=QwHaLPABesx7d5/j3x12hIcxYC34Sn1H6q/wG6IKsP01DV6bVDULfagx4oXoCs3Ide 8AZReZz8rL7CCh0ADoDAU3uSH8V+5Rj83iCin00gUHyxcY+Lipq4nj101TNac04gQSIX NvicSg/O7f6Hfg5jKYaA+AdkxVJx+Unrh7QDftiVuGLa8qCCWtqYZXx168O06Hc2bHmH N63IPEwPOkmo/nNfsa4fGuKCtDy18YgtC65phJDyh+hYQ+OO4z7WQB0BruSe/oQ/FWwj p2jY8ahZrpXrTjEsNHjNW37rL7cTPjnp4xeuzYJDZnwPEJBo/JSlVwcLr0Tq/YYov6sY kuvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=UHJ2/qH7npfqGNlcSh8Wx2Wjttc6KVytTzDDDKXYaR4=; b=QasIC8A4W8efDOHYTXX2wxBWq4djhjAI/MsdFmh+r4Skq7T6lQSslAzNwJiqrOcFyw 4YFqGPQVlgYpbzWfq2R+FQJ6XS0DWme59L3T1QOqOpAXIetlGOLFsXVJ1DX3d1D84bHR CbGcXGZ6OLlT3S3fdSiROOrCbiHmgNIzaIutiiMPgSCHLtsRvS3jQH6Lk/4NHFf1zp9F 0f9QzXeEshga8JQlb6EZTwZ9ZOuU542GmPOwf3t7tHijFXQM0fdi820Oofkb3QPje2nZ 0XCsyIr/xkK2Y8uGi6tERkkeHty4k33JlCv2QxEBbVOeK2Rgs8Q6TK58OciwFnPPGQJr QuRQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v4-v6si1028206plo.55.2018.03.09.07.41.05; Fri, 09 Mar 2018 07:41:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932244AbeCIPjc (ORCPT + 99 others); Fri, 9 Mar 2018 10:39:32 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:55556 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932195AbeCIPj3 (ORCPT ); Fri, 9 Mar 2018 10:39:29 -0500 Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w29FVAmd110859 for ; Fri, 9 Mar 2018 10:39:29 -0500 Received: from e06smtp12.uk.ibm.com (e06smtp12.uk.ibm.com [195.75.94.108]) by mx0b-001b2d01.pphosted.com with ESMTP id 2gkrsmb5fa-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Fri, 09 Mar 2018 10:39:27 -0500 Received: from localhost by e06smtp12.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 9 Mar 2018 15:39:23 -0000 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp12.uk.ibm.com (192.168.101.142) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Fri, 9 Mar 2018 15:39:21 -0000 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w29FdLT948824366; Fri, 9 Mar 2018 15:39:21 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id C351BAE053; Fri, 9 Mar 2018 15:29:54 +0000 (GMT) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4BAB9AE04D; Fri, 9 Mar 2018 15:29:52 +0000 (GMT) Received: from swastik.in.ibm.com (unknown [9.195.43.182]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 9 Mar 2018 15:29:51 +0000 (GMT) From: Nayna Jain To: dhowells@redhat.com Cc: keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, Nayna Jain Subject: [PATCH v2 1/3] certs: define a trusted platform keyring Date: Fri, 9 Mar 2018 21:08:01 +0530 X-Mailer: git-send-email 2.13.6 X-TM-AS-GCONF: 00 x-cbid: 18030915-0008-0000-0000-000004D9E3A4 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18030915-0009-0000-0000-00001E6D0885 Message-Id: <20180309153803.25859-1-nayna@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-03-09_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=1 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1803090194 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The kernel can be supplied in SEEPROM or lockable flash memory in embedded devices. Some devices may not support secure boot, but the kernel is trusted because the image is stored in protected memory. That kernel may need to kexec additional kernels, it may be used as a bootloader, for example, or it may need to kexec a crashdump kernel. In such cases, it may want to verify the signature of the next kernel. The kernel, however, cannot directly verify platform keys, and an administrator may therefore not want to trust them for arbitrary usage. In order to differentiate platform keys from other keys and provide the necessary separation of trust, the kernel needs an additional keyring to store platform keys. This patch implements a built-in list of certificates that are loaded onto the trusted platform keyring named ".platform_keys" to facilitate signature verification during kexec. Because the platform keyring are builtin, it cannot be updated from userspace. This keyring can be enabled by setting CONFIG_PLATFORM_KEYRING. The platform certificate can be provided using CONFIG_PLATFORM_TRUSTED_KEYS. Signed-off-by: Nayna Jain --- Changelog: v2: * Include David Howell's feedback: * Fix the indentation * Fix the patch description per line length as suggested by Mimi certs/Kconfig | 17 ++++++++++++++ certs/Makefile | 13 +++++++++++ certs/system_certificates.S | 20 +++++++++++++++++ certs/system_keyring.c | 55 ++++++++++++++++++++++++++++++++++++++------- 4 files changed, 97 insertions(+), 8 deletions(-) diff --git a/certs/Kconfig b/certs/Kconfig index 5f7663df6e8e..608a4358a25e 100644 --- a/certs/Kconfig +++ b/certs/Kconfig @@ -83,4 +83,21 @@ config SYSTEM_BLACKLIST_HASH_LIST wrapper to incorporate the list into the kernel. Each should be a string of hex digits. +config PLATFORM_KEYRING + bool "Provide keyring for platform trusted keys" + depends on KEYS + depends on ASYMMETRIC_KEY_TYPE + help + Provide a separate, distinct keyring for platform trusted keys, which + the kernel automatically populates during initialization from values + embedded during build, used for verifying the kexec'ed kernel image + and, possibly, the initramfs signature. + +config PLATFORM_TRUSTED_KEYS + string "Platform/Firmware trusted X.509 certs." + depends on PLATFORM_KEYRING + help + Provide the filename of a PEM-formatted file containing the platform + trusted X.509 certificates to be loaded in the platform keyring. + endmenu diff --git a/certs/Makefile b/certs/Makefile index 5d0999b9e21b..680903725031 100644 --- a/certs/Makefile +++ b/certs/Makefile @@ -104,3 +104,16 @@ targets += signing_key.x509 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE $(call if_changed,extract_certs,$(MODULE_SIG_KEY_SRCPREFIX)$(CONFIG_MODULE_SIG_KEY)) endif # CONFIG_MODULE_SIG + + +ifeq ($(CONFIG_PLATFORM_KEYRING),y) + +$(eval $(call config_filename,PLATFORM_TRUSTED_KEYS)) + +# GCC doesn't include .incbin files in -MD generated dependencies (PR#66871) +$(obj)/system_certificates.o: $(obj)/platform_certificate_list + +targets += platform_certificate_list +$(obj)/platform_certificate_list: scripts/extract-cert $(PLATFORM_TRUSTED_KEYS_FILENAME) FORCE + $(call if_changed,extract_certs,$(CONFIG_PLATFORM_TRUSTED_KEYS)) +endif # CONFIG_PLATFORM_KEYRING diff --git a/certs/system_certificates.S b/certs/system_certificates.S index 3918ff7235ed..b0eb448ee617 100644 --- a/certs/system_certificates.S +++ b/certs/system_certificates.S @@ -14,6 +14,15 @@ __cert_list_start: .incbin "certs/x509_certificate_list" __cert_list_end: +#ifdef CONFIG_PLATFORM_KEYRING + .align 8 + .globl VMLINUX_SYMBOL(platform_certificate_list) +VMLINUX_SYMBOL(platform_certificate_list): +__platform_cert_list_start: + .incbin "certs/platform_certificate_list" +__platform_cert_list_end: +#endif /* CONFIG_PLATFORM_KEYRING */ + #ifdef CONFIG_SYSTEM_EXTRA_CERTIFICATE .globl VMLINUX_SYMBOL(system_extra_cert) .size system_extra_cert, CONFIG_SYSTEM_EXTRA_CERTIFICATE_SIZE @@ -35,3 +44,14 @@ VMLINUX_SYMBOL(system_certificate_list_size): #else .long __cert_list_end - __cert_list_start #endif + +#ifdef CONFIG_PLATFORM_KEYRING + .align 8 + .globl VMLINUX_SYMBOL(platform_certificate_list_size) +VMLINUX_SYMBOL(platform_certificate_list_size): +#ifdef CONFIG_64BIT + .quad __platform_cert_list_end - __platform_cert_list_start +#else + .long __platform_cert_list_end - __platform_cert_list_start +#endif +#endif /* CONFIG_PLATFORM_KEYRING */ diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 6251d1b27f0c..594b4986a081 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -19,14 +19,22 @@ #include #include +#define BUILTIN_TRUSTED_KEYRING 0 +#define PLATFORM_KEYRING 1 + static struct key *builtin_trusted_keys; #ifdef CONFIG_SECONDARY_TRUSTED_KEYRING static struct key *secondary_trusted_keys; #endif +#ifdef CONFIG_PLATFORM_KEYRING +static struct key *platform_keys __ro_after_init; +#endif extern __initconst const u8 system_certificate_list[]; extern __initconst const unsigned long system_certificate_list_size; +extern __initconst const u8 platform_certificate_list[]; +extern __initconst const unsigned long platform_certificate_list_size; /** * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA * @@ -123,6 +131,18 @@ static __init int system_trusted_keyring_init(void) panic("Can't link trusted keyrings\n"); #endif +#ifdef CONFIG_PLATFORM_KEYRING + platform_keys = + keyring_alloc(".platform_keys", + KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), + ((KEY_POS_ALL & ~KEY_POS_SETATTR) | + KEY_USR_VIEW | KEY_USR_READ | KEY_USR_SEARCH), + KEY_ALLOC_NOT_IN_QUOTA, + NULL, NULL); + if (IS_ERR(platform_keys)) + panic("Can't allocate platform keyring\n"); +#endif + return 0; } @@ -132,18 +152,19 @@ static __init int system_trusted_keyring_init(void) device_initcall(system_trusted_keyring_init); /* - * Load the compiled-in list of X.509 certificates. + * Load the certificates to the keyring. */ -static __init int load_system_certificate_list(void) +static __init int load_certificate_list(const u8 *p, unsigned long size, + struct key *keyring) { key_ref_t key; - const u8 *p, *end; + const u8 *end; size_t plen; - pr_notice("Loading compiled-in X.509 certificates\n"); + pr_notice("Loading compiled-in X.509 certificates to %s\n", + keyring->description); - p = system_certificate_list; - end = p + system_certificate_list_size; + end = p + size; while (p < end) { /* Each cert begins with an ASN.1 SEQUENCE tag and must be more * than 256 bytes in size. @@ -158,7 +179,7 @@ static __init int load_system_certificate_list(void) if (plen > end - p) goto dodgy_cert; - key = key_create_or_update(make_key_ref(builtin_trusted_keys, 1), + key = key_create_or_update(make_key_ref(keyring, 1), "asymmetric", NULL, p, @@ -185,7 +206,25 @@ static __init int load_system_certificate_list(void) pr_err("Problem parsing in-kernel X.509 certificate list\n"); return 0; } -late_initcall(load_system_certificate_list); + +/* + * Load the compiled-in list of system and platform X.509 certificates. + */ +static __init int load_compiled_certificate_list(void) +{ + /* Loading certs in builtin keyring */ + load_certificate_list(system_certificate_list, + system_certificate_list_size, builtin_trusted_keys); + +#ifdef CONFIG_PLATFORM_KEYRING + /* Loading certs in platform keyring */ + load_certificate_list(platform_certificate_list, + platform_certificate_list_size, platform_keys); +#endif + + return 0; +} +late_initcall(load_compiled_certificate_list); #ifdef CONFIG_SYSTEM_DATA_VERIFICATION -- 2.13.6