Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp768997imm; Wed, 4 Jul 2018 05:47:18 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcQCLTKbUDIcdsAGZw2M0ZpcXgKp/903OJ8+zebheqzC1Na+9ZS1eYXyYDs546t+BbU/cYK X-Received: by 2002:a65:6110:: with SMTP id z16-v6mr1843595pgu.412.1530708438269; Wed, 04 Jul 2018 05:47:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530708438; cv=none; d=google.com; s=arc-20160816; b=wt+xxbrIIcv+He6coU+SfG669qkpb7NzNESHAds8lmjHTXvyo/c1mBQzKvyzICcpt3 rLkGSeRnNqq/O90PSmc6XGkHdn8EsO12M2F8iPtiCizwR6NatDVm0QRpjpWU2CSb7UiQ rMliolTBQFdpgYqh/2J6cw2BVPNQVz9baNm6jilNaJ4YrhTU4wC53kwHV4hnlPQBWmIy lwoe35zwcCjAj+a5y4S7ipDlAbtTP69hyYj401VyZQleugwyMO36fBdsS00teU2jqWXg KI29Xi7Ta3cnRGORn7qY+QbT3R1Pu7ARP4KMW5hgGpbBah0OEddlFdKm1u2r3/d1dk97 nOCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=fiPKvJEJAnMZb1pA9+QpVAwy9L4BtBEpNNGYHEQ+rSI=; b=zG9obRVokt/4LYnWeaPwvibkTKvY/3Yc7Kq1Fy1qJJ6GvXeI6VKSf31lDk0CkTYkJK ePJX/TEcnYZ2yHuFHPiBnDg1ctXO8h2WsBHn3/zU6OEWZH4yLotoQC9aNRUhmZPqAaPD Q8XkyDY9IKQActed7cBhnILhKSp6faO7U1cBneyWJ4OvhbmVe/ydzZQTITs0aw/Dm8La qKvBHGibvWy2LvQdRDr4iyl0iKENFoyqa1C7Foxkms81bVKNSj9m3XcFJ8u/JF0oWRMZ 3cNj8SyXOy6Qs3E7zWQviS/CTSALEU1vDkl6xqfsqYzOXLsB8b8TUCRKg+Dqz11yD1cZ QV4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t8-v6si3640857pfi.221.2018.07.04.05.47.03; Wed, 04 Jul 2018 05:47:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933655AbeGDMp2 (ORCPT + 99 others); Wed, 4 Jul 2018 08:45:28 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:53505 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934700AbeGDMmZ (ORCPT ); Wed, 4 Jul 2018 08:42:25 -0400 Received: from dude.hi.pengutronix.de ([2001:67c:670:100:1d::7]) by metis.ext.pengutronix.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1fah6n-0001dc-0F; Wed, 04 Jul 2018 14:42:09 +0200 Received: from sha by dude.hi.pengutronix.de with local (Exim 4.91) (envelope-from ) id 1fah6l-0005au-ND; Wed, 04 Jul 2018 14:42:07 +0200 From: Sascha Hauer To: linux-mtd@lists.infradead.org Cc: David Gstir , Richard Weinberger , kernel@pengutronix.de, linux-kernel@vger.kernel.org, Sascha Hauer Subject: [PATCH 20/25] ubifs: authentication: Authenticate super block node Date: Wed, 4 Jul 2018 14:41:32 +0200 Message-Id: <20180704124137.13396-21-s.hauer@pengutronix.de> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180704124137.13396-1-s.hauer@pengutronix.de> References: <20180704124137.13396-1-s.hauer@pengutronix.de> X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::7 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This adds a HMAC covering the super block node and adds the logic that decides if a filesystem shall be mounted unauthenticated or authenticated. Signed-off-by: Sascha Hauer --- fs/ubifs/sb.c | 63 ++++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 62 insertions(+), 1 deletion(-) diff --git a/fs/ubifs/sb.c b/fs/ubifs/sb.c index 155480f62fac..2e814b5fb5d1 100644 --- a/fs/ubifs/sb.c +++ b/fs/ubifs/sb.c @@ -517,6 +517,62 @@ static struct ubifs_sb_node *ubifs_read_sb_node(struct ubifs_info *c) return sup; } +static int authenticate_sb_node(struct ubifs_info *c, + const struct ubifs_sb_node *sup) +{ + unsigned int sup_flags = le32_to_cpu(sup->flags); + u8 hmac_wkm[UBIFS_MAX_HMAC_LEN]; + int authenticated = !!(sup_flags & UBIFS_FLG_AUTHENTICATION); + int hash_algo; + int err; + + if (c->authenticated && !authenticated) { + ubifs_err(c, "authenticated FS forced, but found FS without authentication"); + return -EINVAL; + } + + if (!c->authenticated && authenticated) { + ubifs_err(c, "authenticated FS found, but no key given"); + return -EINVAL; + } + + ubifs_msg(c, "Mounting in %sauthenticated mode", + c->authenticated ? "" : "un"); + + if (!c->authenticated) + return 0; + + if (!IS_ENABLED(CONFIG_UBIFS_FS_AUTHENTICATION)) + return -EOPNOTSUPP; + + hash_algo = le16_to_cpu(sup->hash_algo); + if (hash_algo >= HASH_ALGO__LAST) { + ubifs_err(c, "superblock uses unknown hash algo %d", + hash_algo); + return -EINVAL; + } + + if (strcmp(hash_algo_name[hash_algo], c->auth_hash_name)) { + ubifs_err(c, "This filesystem uses %s for hashing," + " but %s is specified", hash_algo_name[hash_algo], + c->auth_hash_name); + return -EINVAL; + } + + ubifs_hmac_wkm(c, hmac_wkm); + if (ubifs_check_hmac(c, hmac_wkm, sup->hmac_wkm)) { + ubifs_err(c, "provided key does not fit"); + return -ENOKEY; + } + + err = ubifs_node_verify_hmac(c, sup, sizeof(*sup), + offsetof(struct ubifs_sb_node, hmac)); + if (err) + ubifs_err(c, "Failed to authenticate superblock: %d", err); + + return err; +} + /** * ubifs_write_sb_node - write superblock node. * @c: UBIFS file-system description object @@ -528,7 +584,8 @@ int ubifs_write_sb_node(struct ubifs_info *c, struct ubifs_sb_node *sup) { int len = ALIGN(UBIFS_SB_NODE_SZ, c->min_io_size); - ubifs_prepare_node(c, sup, UBIFS_SB_NODE_SZ, 1); + ubifs_prepare_node_hmac(c, sup, UBIFS_SB_NODE_SZ, + offsetof(struct ubifs_sb_node, hmac), 1); return ubifs_leb_change(c, UBIFS_SB_LNUM, sup, len); } @@ -642,6 +699,10 @@ int ubifs_read_superblock(struct ubifs_info *c) c->double_hash = !!(sup_flags & UBIFS_FLG_DOUBLE_HASH); c->encrypted = !!(sup_flags & UBIFS_FLG_ENCRYPTION); + err = authenticate_sb_node(c, sup); + if (err) + goto out; + if ((sup_flags & ~UBIFS_FLG_MASK) != 0) { ubifs_err(c, "Unknown feature flags found: %#x", sup_flags & ~UBIFS_FLG_MASK); -- 2.18.0