Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp1106070pxu; Fri, 16 Oct 2020 04:10:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyPnhjd7gR/ioK7hJtWbEkcdzdsoFJQVCioYb7c+qUq718Yw8sKCPwQyShMeETXeB/7XOW3 X-Received: by 2002:a17:907:43c0:: with SMTP id ok24mr3021586ejb.385.1602846622640; Fri, 16 Oct 2020 04:10:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602846622; cv=none; d=google.com; s=arc-20160816; b=iJNk3ztNmToBfdUPP2ByPaz1SSy+rXHwhBjjpvQy8kMwehp9aU6YY20MF1qsJ6Z1tM 8oKE3Aoa/OQ/N7oLkGY5DVCanV/SUC1zW4BfNa1Ec2hu+9OP5QEa8WelR3WfBXcPZm1F MpVozNtHLJG+P2HX+Edja0CqPt/domrMsII6rELvnRcvDe2wgkYqAQ39+TiMxAwfEKIu lXx+cWyg7EYqBp03b4eFtFeag3wlNr+IB18O+7ufXKnbHxNcqokdtEg4NrbaTMBZAzf4 8gELcSkM4FPeL7DGSvmto5RjBXZgwEwgG1kVucd7hSbDYGBrZRka4TbdVTlDMIhO9ID5 ocqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=LwhJdTT27d02vCwyIwuWvDcz8inlLEdJ/eX2mfDQiwM=; b=L/YlrifCYOWUzbctXbKSLeDQcbC+RhSzIMT3/bHXQGLAHuzI48u/6phKl7lAm68Bfz deXRBUpeRSwjK8XtPpcchiRtGh7lsTtVh4MxaY+W/8AM/IjjWdNfMa9oYYhzpcz40IaX oK7ukhp8UcuPNoilsYwl2ccmxvO5M+hxrt0DRz5g10oPBXT445HKxsbIMtt8XfTSXphi DhbX//oiy8q7+Yt4NqsB5cXuHvGaBKM/lHbjypDKptAG5Ycvu14pKSx118s08QApxfWV kuGzy8DOsxD8fvvc1AJi0BS6d83PS7/qzM07O3hF8XZLAt9g3sts5K7LX8qxjU0Wtcay 56Mw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f3si1376783ejz.386.2020.10.16.04.09.25; Fri, 16 Oct 2020 04:10:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394609AbgJPI3r (ORCPT + 99 others); Fri, 16 Oct 2020 04:29:47 -0400 Received: from smtp-42ae.mail.infomaniak.ch ([84.16.66.174]:51885 "EHLO smtp-42ae.mail.infomaniak.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2394392AbgJPI3r (ORCPT ); Fri, 16 Oct 2020 04:29:47 -0400 Received: from smtp-2-0000.mail.infomaniak.ch (unknown [10.5.36.107]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4CCK881ZphzlhX5w; Fri, 16 Oct 2020 10:29:44 +0200 (CEST) Received: from ns3096276.ip-94-23-54.eu (unknown [94.23.54.103]) by smtp-2-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4CCK864nJFzlh8T9; Fri, 16 Oct 2020 10:29:42 +0200 (CEST) Subject: Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring To: Mike Snitzer Cc: Alasdair Kergon , Andrew Morton , Deven Bowers , Jaskaran Khurana , Milan Broz , dm-devel@redhat.com, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, Jarkko Sakkinen , =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= References: <20201015150504.1319098-1-mic@digikod.net> <20201015165229.GA5513@redhat.com> From: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= Message-ID: <022e949e-00c4-d98a-b536-1c5f9e05c09c@digikod.net> Date: Fri, 16 Oct 2020 10:29:42 +0200 User-Agent: MIME-Version: 1.0 In-Reply-To: <20201015165229.GA5513@redhat.com> Content-Type: text/plain; charset=iso-8859-15 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 15/10/2020 18:52, Mike Snitzer wrote: > On Thu, Oct 15 2020 at 11:05am -0400, > Micka?l Sala?n wrote: > >> From: Micka?l Sala?n >> >> Add a new configuration DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING >> to enable dm-verity signatures to be verified against the secondary >> trusted keyring. Instead of relying on the builtin trusted keyring >> (with hard-coded certificates), the second trusted keyring can include >> certificate authorities from the builtin trusted keyring and child >> certificates loaded at run time. Using the secondary trusted keyring >> enables to use dm-verity disks (e.g. loop devices) signed by keys which >> did not exist at kernel build time, leveraging the certificate chain of >> trust model. In practice, this makes it possible to update certificates >> without kernel update and reboot, aligning with module and kernel >> (kexec) signature verification which already use the secondary trusted >> keyring. >> >> Cc: Alasdair Kergon >> Cc: Andrew Morton >> Cc: Jarkko Sakkinen >> Cc: Jaskaran Khurana >> Cc: Mike Snitzer >> Cc: Milan Broz >> Signed-off-by: Micka?l Sala?n >> --- >> >> Previous version: >> https://lore.kernel.org/lkml/20201002071802.535023-1-mic@digikod.net/ >> >> Changes since v1: >> * Extend the commit message (asked by Jarkko Sakkinen). >> * Rename the Kconfig "help" keyword according to commit 84af7a6194e4 >> ("checkpatch: kconfig: prefer 'help' over '---help---'"). > > Can you please explain why you've decided to make this a Kconfig CONFIG > knob? Why not either add: a dm-verity table argument? A dm-verity > kernel module parameter? or both (to allow a particular default but then > per-device override)? The purpose of signed dm-verity images is to authenticate files, or said in another way, to enable the kernel to trust disk images in a flexible way (i.e. thanks to certificate's chain of trust). Being able to update such chain at run time requires to use the second trusted keyring. This keyring automatically includes the certificate authorities from the builtin trusted keyring, which are required to dynamically populate the secondary trusted keyring with certificates signed by an already trusted authority. The roots of trust must then be included at build time in the builtin trusted keyring. To be meaningful, using dm-verity signatures implies to have a restricted user space, i.e. even the root user has limited power over the kernel and the rest of the system. Blindly trusting data provided by user space (e.g. dm-verity table argument, kernel module parameter) defeat the purpose of (mandatory) authenticated images. > > Otherwise, _all_ DM verity devices will be configured to use secondary > keyring fallback. Is that really desirable? That is already the current state (on purpose). > > Regardless, I really don't see why a Kconfig knob is appropriate. Moreover, a Kconfig knob makes sense as much as DM_VERITY_VERIFY_ROOTHASH_SIG, IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY, MODULE_SIG_FORCE and other similar authentication mechanisms. Indeed, when using these configurations, we want the kernel to enforce a specific policy. Obviously, we can't make the DM_VERITY_VERIFY_ROOTHASH_SIG relies on the secondary trusted keyring without important security implications for systems already using this configuration (and then the builtin trusted keyring as the unique source of trust).