Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2390660pxb; Tue, 13 Apr 2021 00:15:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzs47Xn+F7tIEMxaErI7oJPW6V/l3LlRGTcSdwUnc4jHwEzJoquxTLBv9ZqXzYgMXWObXJT X-Received: by 2002:aa7:cd7b:: with SMTP id ca27mr24819848edb.354.1618298140125; Tue, 13 Apr 2021 00:15:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618298140; cv=none; d=google.com; s=arc-20160816; b=IOVMGvK8P7ow8V5Qwcb/s1+9Z9N6EyO3NQppYFBgKe0hCPOTvB3IX2NpEiSyMKhTyw q/bGyemvl8HY6d8fMa8lxfJNp3JzE/lzS+6NmUQpc0F6+aK+42V6yQrPHvBWqls+kniI UuAb9D4NeXbG3ydYf4YNV7oVBKB8Wok3Vnm0aCXD70R7f3QobkoxBMpUp+gkyynGdF2F B7XI01ix071g6WdWNurfoMkZ6xj9nZ/LZeG/8JBcPwTGuhNVLduqOAWSt/rpyTSAcxao EdKOZPiXqjR/KVmHQKq4bK7o6T66D+hnDUqj3mwOS+vB0eAMFuM3t5pHQvLJLXP+yqJh W68Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=T1rjmwGZCfV3Wdujd1F9jgDadUdVKVMwRumv0bVuOOo=; b=GvsFHSNZoe6nop+Aiu/RIZpvfI609IyEvO2gXq19nzj0CeBGudrRkWc1sm5zW0mdHx Q+1/1v6amfvbK6F1Drs34dvAjl5UHldG1CKkxVplqXQmMruhbMkeAzqu/CeWrw8SAII4 GZAbEnt0ET+g5fye15V2lg9OmRk31UKPOtbdY+iJXzl06TC8NIz/km9zGzffDJh8IoWi bNd5uw2nSktczJV+xekt4346vYRP7dTNwyxlgQwU0/yqF49QX2ctlcBhRTXkYC5OpuDe DTEWlMBLGI2ZdfLrrziFwSo7QjYIar9UZkh9RlxLux1ho7Ee8QCwiVyC5032hruTVw9b TAAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=U0GWbiQ9; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id go8si9558823ejc.645.2021.04.13.00.15.08; Tue, 13 Apr 2021 00:15:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=U0GWbiQ9; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240613AbhDLVLc (ORCPT + 99 others); Mon, 12 Apr 2021 17:11:32 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:55892 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240417AbhDLVLb (ORCPT ); Mon, 12 Apr 2021 17:11:31 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1618261872; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=T1rjmwGZCfV3Wdujd1F9jgDadUdVKVMwRumv0bVuOOo=; b=U0GWbiQ9yhQf9MljjMs79Xk9ecE86MN4iHHFuI4UR3C9MxFP26WOljOjVaimV6XM0wF+bI vKKJ/B8cvqw9GcZWZ6AFpjdqE8FjoIWklLRlu/aRzQvd1g7ZXb7cJ5p/PkYqwhJdcmpN6T KW+s5wgoD7iBajiE4hjkeW5eYcfb3EI= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-549-tz4JTTSgN-SIKfWKa6REUQ-1; Mon, 12 Apr 2021 17:11:09 -0400 X-MC-Unique: tz4JTTSgN-SIKfWKa6REUQ-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 9B812801814; Mon, 12 Apr 2021 21:11:07 +0000 (UTC) Received: from ovpn-114-108.phx2.redhat.com (ovpn-114-108.phx2.redhat.com [10.3.114.108]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C0F955C1BB; Mon, 12 Apr 2021 21:11:06 +0000 (UTC) Message-ID: <31b88b39772636f8faee6949562c76c82f615bdb.camel@redhat.com> Subject: Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check From: Simo Sorce To: Ard Biesheuvel , Chris von Recklinghausen Cc: Eric Biggers , "Rafael J. Wysocki" , Dexuan Cui , Linux PM , Linux Crypto Mailing List , Linux Kernel Mailing List Date: Mon, 12 Apr 2021 17:11:05 -0400 In-Reply-To: References: <20210412140932.31162-1-crecklin@redhat.com> <5795c815-7715-1ecb-dd83-65f3d18b9092@redhat.com> <862c8208-5809-9726-7e22-7a16fcd30edd@redhat.com> Organization: Red Hat, Inc. Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, 2021-04-12 at 22:29 +0200, Ard Biesheuvel wrote: > On Mon, 12 Apr 2021 at 21:51, Chris von Recklinghausen > wrote: > > On 4/12/21 3:27 PM, Ard Biesheuvel wrote: > > > On Mon, 12 Apr 2021 at 21:20, Eric Biggers wrote: > > > > On Mon, Apr 12, 2021 at 03:04:58PM -0400, Chris von Recklinghausen wrote: > > > > > On 4/12/21 1:45 PM, Eric Biggers wrote: > > > > > > On Mon, Apr 12, 2021 at 10:09:32AM -0400, Chris von Recklinghausen wrote: > > > > > > > Suspend fails on a system in fips mode because md5 is used for the e820 > > > > > > > integrity check and is not available. Use crc32 instead. > > > > > > > > > > > > > > This patch changes the integrity check algorithm from md5 to crc32. > > > > > > > > > > > > > > The purpose of the integrity check is to detect possible differences > > > > > > > between the memory map used at the time when the hibernation image is > > > > > > > about to be loaded into memory and the memory map used at the image > > > > > > > creation time, because it is generally unsafe to load the image if the > > > > > > > current memory map doesn't match the one used when it was created. so > > > > > > > it is not intended as a cryptographic integrity check. > > > > > > This still doesn't actually explain why a non-cryptographic checksum is > > > > > > sufficient. "Detection of possible differences" could very well require > > > > > > cryptographic authentication; it depends on whether malicious changes need to be > > > > > > detected or not. > > > > > Hi Eric, > > > > > > > > > > The cases that the commit comments for 62a03defeabd mention are the same as > > > > > for this patch, e.g. > > > > > > > > > > 1. Without this patch applied, it is possible that BIOS has > > > > > provided an inconsistent memory map, but the resume kernel is still > > > > > able to restore the image anyway(e.g, E820_RAM region is the superset > > > > > of the previous one), although the system might be unstable. So this > > > > > patch tries to treat any inconsistent e820 as illegal. > > > > > > > > > > 2. Another case is, this patch replies on comparing the e820_saved, but > > > > > currently the e820_save might not be strictly the same across > > > > > hibernation, even if BIOS has provided consistent e820 map - In > > > > > theory mptable might modify the BIOS-provided e820_saved dynamically > > > > > in early_reserve_e820_mpc_new, which would allocate a buffer from > > > > > E820_RAM, and marks it from E820_RAM to E820_RESERVED). > > > > > This is a potential and rare case we need to deal with in OS in > > > > > the future. > > > > > > > > > > Maybe they should be added to the comments with this patch as well? In any > > > > > case, the above comments only mention detecting consequences of BIOS > > > > > issues/actions on the e820 map and not intrusions from attackers requiring > > > > > cryptographic protection. Does that seem to be a reasonable explanation to > > > > > you? If so I can add these to the commit comments. > > > > > > > > > > I'll make the other changes you suggest below. > > > > > > > > > > Thanks, > > > > > > > > > Those details are still missing the high-level point. Is this just meant to > > > > detect non-malicious changes (presumably caused by BIOS bugs), or is it meant to > > > > detect malicious changes? That's all that really needs to be mentioned. > > > > > > > This is not about BIOS bugs. Hibernation is deep suspend/resume > > > grafted onto cold boot, and it is perfectly legal for the firmware to > > > present a different memory map to the OS after a cold boot. It is > > > Linux that decides that it can restore the entire system state from a > > > swap file, and carry on as if the cold boot was just a [firmware > > > assisted] suspend/resume. > > > > > > So forging collisions is *not* a concern here. Let's avoid accidental > > > or malicious, as those adjectives seem to confuse some people. The > > > bottom line is that there is no need to protect against deliberate > > > attempts to hide the fact that the memory map has changed, and so > > > there is no reason to use cryptographic hashes here. > > > > > How about : > > > > The check is intended to differentiate between a resume (which expects > > an identical e820 map to the one saved in suspend), and a cold boot > > (which need not have an identical e820 map to that saved in suspend if > > any was done at all). It is not necessary here to protect against > > deliberate attempts to hide the fact that the memory map has changed, so > > crc32 is sufficient for detection. > > > > Almost. Hibernation always occurs after a cold boot, but usually, the > E820 memory map happens to be the same. > > How about > > """ > The check is intended to detect whether the E820 memory map provided > by the firmware after cold boot unexpectedly differs from the one that > was in use when the hibernation image was created. In this case, the > hibernation image cannot be restored, as it may cover memory regions > that are no longer available to the OS. > > A non-cryptographic hash such as CRC-32 is sufficient to detect such > inadvertent deviations. > """ hash -> checksum Simo. -- Simo Sorce RHEL Crypto Team Red Hat, Inc