2021-06-22 12:46:14

by Ahmad Fatoum

[permalink] [raw]
Subject: [PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development

A key aspect of trusted keys is that they are never disclosed to
userspace in plain text. For development and debugging, it can be still
useful to be able to supply a key in plain text from userspace.

Implement an optional knob to support this according to the semantics
Jan and Mimi had agreed on here[1].

[1] https://lore.kernel.org/linux-integrity/[email protected]/

Suggested-by: Jan Luebbe <[email protected]>
Cc: Mimi Zohar <[email protected]>
Signed-off-by: Ahmad Fatoum <[email protected]>
---
Manual resend.

To: James Bottomley <[email protected]>
To: Jarkko Sakkinen <[email protected]>
To: Mimi Zohar <[email protected]>
To: David Howells <[email protected]>
Cc: James Morris <[email protected]>
Cc: Eric Biggers <[email protected]>
Cc: "Serge E. Hallyn" <[email protected]>
Cc: "Horia Geantă" <[email protected]>
Cc: Aymen Sghaier <[email protected]>
Cc: Udit Agarwal <[email protected]>
Cc: Jan Luebbe <[email protected]>
Cc: David Gstir <[email protected]>
Cc: Richard Weinberger <[email protected]>
Cc: Franck LENORMAND <[email protected]>
Cc: Sumit Garg <[email protected]>
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
---
Documentation/security/keys/trusted-encrypted.rst | 14 +++++++++++-
security/keys/trusted-keys/Kconfig | 15 +++++++++++-
security/keys/trusted-keys/trusted_core.c | 21 ++++++++++++++--
3 files changed, 48 insertions(+), 2 deletions(-)

diff --git a/Documentation/security/keys/trusted-encrypted.rst b/Documentation/security/keys/trusted-encrypted.rst
index 80d5a5af62a1..cc2e677b3bb6 100644
--- a/Documentation/security/keys/trusted-encrypted.rst
+++ b/Documentation/security/keys/trusted-encrypted.rst
@@ -188,6 +188,20 @@ Usage::
specific to TEE device implementation. The key length for new keys is always
in bytes. Trusted Keys can be 32 - 128 bytes (256 - 1024 bits).

+Trusted Keys: import plain-text key for development
+---------------------------------------------------
+
+Usage::
+
+ keyctl add trusted name "import hex_key_material" ring
+
+For kernels built with ``CONFIG_TRUSTED_KEYS_DEVELOPMENT_IMPORT=y``, new
+trusted keys can be created from existing key material supplied by userspace,
+instead of using random numbers. Once defined, as with random trusted keys,
+userspace cannot extract the plain-text key material again and will only
+ever see encrypted blobs. This option should *not* be enabled for production
+kernels.
+
Encrypted Keys usage
--------------------

diff --git a/security/keys/trusted-keys/Kconfig b/security/keys/trusted-keys/Kconfig
index 24af4aaceebf..8bd69b252bf9 100644
--- a/security/keys/trusted-keys/Kconfig
+++ b/security/keys/trusted-keys/Kconfig
@@ -23,3 +23,18 @@ config TRUSTED_KEYS_TEE
if !TRUSTED_KEYS_TPM && !TRUSTED_KEYS_TEE
comment "No trust source selected!"
endif
+
+config TRUSTED_KEYS_DEVELOPMENT_IMPORT
+ bool "Allow creating TRUSTED KEYS from existing key material for development"
+ help
+ This option adds support for creating new trusted keys from
+ existing key material supplied by userspace, instead of using
+ random numbers. Once defined, as with random trusted keys,
+ userspace cannot extract the plain-text key material again
+ and will only ever see encrypted blobs.
+
+ This option should *only* be enabled for debugging/development.
+ Also, consider using 'keyctl padd' instead of 'keyctl add' to
+ avoid exposing the plain-text key on the process command line.
+
+ If you are unsure as to whether this is required, answer N.
diff --git a/security/keys/trusted-keys/trusted_core.c b/security/keys/trusted-keys/trusted_core.c
index 8cab69e5d0da..2223e11c8bb5 100644
--- a/security/keys/trusted-keys/trusted_core.c
+++ b/security/keys/trusted-keys/trusted_core.c
@@ -46,12 +46,13 @@ static unsigned char migratable;

enum {
Opt_err,
- Opt_new, Opt_load, Opt_update,
+ Opt_new, Opt_load, Opt_import, Opt_update,
};

static const match_table_t key_tokens = {
{Opt_new, "new"},
{Opt_load, "load"},
+ {Opt_import, "import"},
{Opt_update, "update"},
{Opt_err, NULL}
};
@@ -100,6 +101,21 @@ static int datablob_parse(char **datablob, struct trusted_key_payload *p)
return -EINVAL;
ret = Opt_load;
break;
+ case Opt_import:
+ if (!IS_ENABLED(CONFIG_TRUSTED_KEYS_DEVELOPMENT_IMPORT))
+ return -EINVAL;
+ /* first argument is unsealed blob */
+ c = strsep(datablob, " \t");
+ if (!c)
+ return -EINVAL;
+ p->key_len = strlen(c) / 2;
+ if (p->key_len < MIN_KEY_SIZE || p->key_len > MAX_KEY_SIZE)
+ return -EINVAL;
+ ret = hex2bin(p->key, c, p->key_len);
+ if (ret < 0)
+ return -EINVAL;
+ ret = Opt_import;
+ break;
case Opt_update:
ret = Opt_update;
break;
@@ -187,7 +203,8 @@ static int trusted_instantiate(struct key *key,
ret = -EIO;
goto out;
}
-
+ fallthrough;
+ case Opt_import:
ret = static_call(trusted_key_seal)(payload, datablob);
if (ret < 0)
pr_info("key_seal failed (%d)\n", ret);
--
git-series 0.9.1