Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1093756pxk; Fri, 2 Oct 2020 00:20:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz3i2tGc65O91mWcCIL/KFLq3dVw//XV3TF89YMSNoN/7WoLDnYKMKSvRMKAdJIh7qhLAlg X-Received: by 2002:aa7:dcd3:: with SMTP id w19mr924289edu.18.1601623229891; Fri, 02 Oct 2020 00:20:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601623229; cv=none; d=google.com; s=arc-20160816; b=cIyQwD2YkrAab+zd6B4V+GCthgsfUIKWtFRj4zBX5Uc+klFtcgOo2AJyxmv5GjlKNr wvS/2Nd5ZPiFuepGeRqLfzItEl9YP2S0PcMMIpu1v/RxS/jtkqVS3i0sILCP8J1Smo2z ZMSEu3ZS8C+95qWoionmDF4NFVSsdP1ltW/KVj+4kbXfJZ3MzWwkkr7SIp5DX5Z54il0 ayEldnJrRQSZtk2TcOMBG7YlqFUC2w47bRJlNORPisSuqntCdWQraVjzHRs6SsTtJvVM YcOm1+rWiHv4lfJAKwVZ/T3dA86PFM9avfpAD0l/3eHOOV6ccrg3Q6irDBcrWz6lSpgn LJYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=5R7nELTjbjXnkycS/loAVYro0NthCnqjcjUdzhkJqOQ=; b=e+BJzoa/9s9NM9+bCUnM/1XkTsdOkXbsxJRBmgORQRSpQpNuBr4ozBoUDISDz+aAEJ VdlBI/szQRwW5Y2kVqQmtHBjDBstKZ7CAF3mjjE/1GHeUlOerEv+Iqcf8FuYu5M51oE7 spmTX535KrP9PTCDhyqTZe3nv+85LhTbfrq75Di5bKcjrxIk6FE6dfMJxjdpqwSbX8Ms sJ48tQaoCg/xrW32lK0OnfJwkDL6iFwCuah14YRw+5Qb/wMKVMjmW2D1wYAE4lPSnttt i8yTyyCtSs+SZhI/OqELZgJ5bdbvN71JoBMh0OccfL9B4osbyqMeIQ6gxUm+HdTQZ7Gl xlyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bu5si439104ejb.750.2020.10.02.00.20.07; Fri, 02 Oct 2020 00:20:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726029AbgJBHS3 (ORCPT + 99 others); Fri, 2 Oct 2020 03:18:29 -0400 Received: from smtp-bc0a.mail.infomaniak.ch ([45.157.188.10]:56245 "EHLO smtp-bc0a.mail.infomaniak.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725961AbgJBHS3 (ORCPT ); Fri, 2 Oct 2020 03:18:29 -0400 Received: from smtp-3-0000.mail.infomaniak.ch (unknown [10.4.36.107]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4C2hDM26gTzlhSjh; Fri, 2 Oct 2020 09:18:27 +0200 (CEST) Received: from localhost (unknown [94.23.54.103]) by smtp-3-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4C2hDL58YNzllmgM; Fri, 2 Oct 2020 09:18:26 +0200 (CEST) From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: Alasdair Kergon , Mike Snitzer Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Deven Bowers , Jaskaran Khurana , Milan Broz , dm-devel@redhat.com, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= Subject: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring Date: Fri, 2 Oct 2020 09:18:02 +0200 Message-Id: <20201002071802.535023-1-mic@digikod.net> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mickaël Salaün Add a new DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING configuration to enable dm-verity signatures to be verified against the secondary trusted keyring. This allows certificate updates without kernel update and reboot, aligning with module and kernel (kexec) signature verifications. Signed-off-by: Mickaël Salaün Cc: Jaskaran Khurana Cc: Mike Snitzer Cc: Milan Broz --- drivers/md/Kconfig | 13 ++++++++++++- drivers/md/dm-verity-verify-sig.c | 9 +++++++-- 2 files changed, 19 insertions(+), 3 deletions(-) diff --git a/drivers/md/Kconfig b/drivers/md/Kconfig index 30ba3573626c..63870fdfe8ce 100644 --- a/drivers/md/Kconfig +++ b/drivers/md/Kconfig @@ -530,11 +530,22 @@ config DM_VERITY_VERIFY_ROOTHASH_SIG bool "Verity data device root hash signature verification support" depends on DM_VERITY select SYSTEM_DATA_VERIFICATION - help + ---help--- Add ability for dm-verity device to be validated if the pre-generated tree of cryptographic checksums passed has a pkcs#7 signature file that can validate the roothash of the tree. + By default, rely on the builtin trusted keyring. + + If unsure, say N. + +config DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING + bool "Verity data device root hash signature verification with secondary keyring" + depends on DM_VERITY_VERIFY_ROOTHASH_SIG + depends on SECONDARY_TRUSTED_KEYRING + ---help--- + Rely on the secondary trusted keyring to verify dm-verity signatures. + If unsure, say N. config DM_VERITY_FEC diff --git a/drivers/md/dm-verity-verify-sig.c b/drivers/md/dm-verity-verify-sig.c index 614e43db93aa..29385dc470d5 100644 --- a/drivers/md/dm-verity-verify-sig.c +++ b/drivers/md/dm-verity-verify-sig.c @@ -119,8 +119,13 @@ int verity_verify_root_hash(const void *root_hash, size_t root_hash_len, } ret = verify_pkcs7_signature(root_hash, root_hash_len, sig_data, - sig_len, NULL, VERIFYING_UNSPECIFIED_SIGNATURE, - NULL, NULL); + sig_len, +#ifdef CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING + VERIFY_USE_SECONDARY_KEYRING, +#else + NULL, +#endif + VERIFYING_UNSPECIFIED_SIGNATURE, NULL, NULL); return ret; } -- 2.28.0