lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <23988242-4b4b-1fc0-8724-ba927324392b@gmail.com>
Date:   Tue, 21 May 2019 15:12:59 +1000
From:   "Singh, Balbir" <bsingharora@...il.com>
To:     Jaskaran Khurana <jaskarankhurana@...ux.microsoft.com>,
        linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Cc:     agk@...hat.com, snitzer@...hat.com, dm-devel@...hat.com,
        jmorris@...ei.org
Subject: Re: [RFC 1/1] Add dm verity root hash pkcs7 sig validation.



On 5/21/19 7:54 AM, Jaskaran Khurana wrote:
> Adds in-kernel pkcs7 signature checking for the roothash of
> the dm-verity hash tree.
> 
> The verification is to support cases where the roothash is not secured by
> Trusted Boot, UEFI Secureboot or similar technologies.
> One of the use cases for this is for dm-verity volumes mounted after boot,
> the root hash provided during the creation of the dm-verity volume has to
> be secure and thus in-kernel validation implemented here will be used
> before we trust the root hash and allow the block device to be created.
> 
The first patch was your cover letter, I'd suggest name it that way in
the subject.

> The signature being provided for verification must verify the root hash and 
> must be trusted by the builtin keyring for verification to succeed.
> 
> Adds DM_VERITY_VERIFY_ROOTHASH_SIG: roothash verification
> against the roothash signature file *if* specified, if signature file is
> specified verification must succeed prior to creation of device mapper 
> block device.
> 
> Adds DM_VERITY_VERIFY_ROOTHASH_SIG_FORCE: roothash signature *must* be
> specified for all dm verity volumes and verification must succeed prior
> to creation of device mapper block device.
> 
> Signed-off-by: Jaskaran Khurana <jaskarankhurana@...ux.microsoft.com>
> ---
>  drivers/md/Kconfig                |  23 ++++++
>  drivers/md/Makefile               |   2 +-
>  drivers/md/dm-verity-target.c     |  44 ++++++++--
>  drivers/md/dm-verity-verify-sig.c | 129 ++++++++++++++++++++++++++++++
>  drivers/md/dm-verity-verify-sig.h |  32 ++++++++
>  5 files changed, 222 insertions(+), 8 deletions(-)
>  create mode 100644 drivers/md/dm-verity-verify-sig.c
>  create mode 100644 drivers/md/dm-verity-verify-sig.h
> 
> diff --git a/drivers/md/Kconfig b/drivers/md/Kconfig
> index db269a348b20..da4115753f25 100644
> --- a/drivers/md/Kconfig
> +++ b/drivers/md/Kconfig
> @@ -489,6 +489,29 @@ config DM_VERITY
>  
>  	  If unsure, say N.
>  
> +config DM_VERITY_VERIFY_ROOTHASH_SIG
> +	def_bool n
> +	bool "Verity data device root hash signature verification support"
> +	depends on DM_VERITY
> +	select SYSTEM_DATA_VERIFICATION
> +	  help
> +	  The device mapper target created by DM-VERITY can be validated if the
> +	  pre-generated tree of cryptographic checksums passed has a pkcs#7
> +	  signature file that can validate the roothash of the tree.
> +
> +	  If unsure, say N.
> +
> +config DM_VERITY_VERIFY_ROOTHASH_SIG_FORCE
> +	def_bool n
> +	bool "Forces all dm verity data device root hash should be signed"
> +	depends on DM_VERITY_VERIFY_ROOTHASH_SIG
> +	  help
> +	  The device mapper target created by DM-VERITY will succeed only if the
> +	  pre-generated tree of cryptographic checksums passed also has a pkcs#7
> +	  signature file that can validate the roothash of the tree.
> +
> +	  If unsure, say N.
> +
>  config DM_VERITY_FEC
>  	bool "Verity forward error correction support"
>  	depends on DM_VERITY
> diff --git a/drivers/md/Makefile b/drivers/md/Makefile
> index be7a6eb92abc..8a8c142bcfe1 100644
> --- a/drivers/md/Makefile
> +++ b/drivers/md/Makefile
> @@ -61,7 +61,7 @@ obj-$(CONFIG_DM_LOG_USERSPACE)	+= dm-log-userspace.o
>  obj-$(CONFIG_DM_ZERO)		+= dm-zero.o
>  obj-$(CONFIG_DM_RAID)	+= dm-raid.o
>  obj-$(CONFIG_DM_THIN_PROVISIONING)	+= dm-thin-pool.o
> -obj-$(CONFIG_DM_VERITY)		+= dm-verity.o
> +obj-$(CONFIG_DM_VERITY)		+= dm-verity.o dm-verity-verify-sig.o
>  obj-$(CONFIG_DM_CACHE)		+= dm-cache.o
>  obj-$(CONFIG_DM_CACHE_SMQ)	+= dm-cache-smq.o
>  obj-$(CONFIG_DM_ERA)		+= dm-era.o
> diff --git a/drivers/md/dm-verity-target.c b/drivers/md/dm-verity-target.c
> index f4c31ffaa88e..53aebfa8bc38 100644
> --- a/drivers/md/dm-verity-target.c
> +++ b/drivers/md/dm-verity-target.c
> @@ -16,7 +16,7 @@
>  
>  #include "dm-verity.h"
>  #include "dm-verity-fec.h"
> -
> +#include "dm-verity-verify-sig.h"
>  #include <linux/module.h>
>  #include <linux/reboot.h>
>  
> @@ -34,7 +34,11 @@
>  #define DM_VERITY_OPT_IGN_ZEROES	"ignore_zero_blocks"
>  #define DM_VERITY_OPT_AT_MOST_ONCE	"check_at_most_once"
>  
> -#define DM_VERITY_OPTS_MAX		(2 + DM_VERITY_OPTS_FEC)
> +#define DM_VERITY_OPTS_MAX		(2 + DM_VERITY_OPTS_FEC + \
> +					 DM_VERITY_ROOT_HASH_VERIFICATION_OPTS)
> +
> +#define DM_VERITY_MANDATORY_ARGS        10
> +
>  
>  static unsigned dm_verity_prefetch_cluster = DM_VERITY_DEFAULT_PREFETCH_SIZE;
>  
> @@ -855,7 +859,8 @@ static int verity_alloc_zero_digest(struct dm_verity *v)
>  	return r;
>  }
>  
> -static int verity_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v)
> +static int verity_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v,
> +				 struct dm_verity_sig_opts *verify_args)
>  {
>  	int r;
>  	unsigned argc;
> @@ -904,6 +909,15 @@ static int verity_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v)
>  			if (r)
>  				return r;
>  			continue;
> +		} else if (verity_verify_is_sig_opt_arg(arg_name)) {
> +			r = verity_verify_sig_parse_opt_args(as, v,
> +							     verify_args,
> +							     &argc, arg_name);
> +			if (r) {
> +				ti->error = "Could not parse the sig args";
> +				return r;
> +			}
> +			continue;
>  		}
>  
>  		ti->error = "Unrecognized verity feature request";
> @@ -930,6 +944,7 @@ static int verity_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v)
>  static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>  {
>  	struct dm_verity *v;
> +	struct dm_verity_sig_opts verify_args = {0};
>  	struct dm_arg_set as;
>  	unsigned int num;
>  	unsigned long long num_ll;
> @@ -937,6 +952,7 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>  	int i;
>  	sector_t hash_position;
>  	char dummy;
> +	char *root_hash_digest_to_validate = NULL;
>  
>  	v = kzalloc(sizeof(struct dm_verity), GFP_KERNEL);
>  	if (!v) {
> @@ -956,7 +972,7 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>  		goto bad;
>  	}
>  
> -	if (argc < 10) {
> +	if (argc < DM_VERITY_MANDATORY_ARGS) {
>  		ti->error = "Not enough arguments";
>  		r = -EINVAL;
>  		goto bad;
> @@ -1070,6 +1086,7 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>  		r = -EINVAL;
>  		goto bad;
>  	}
> +	root_hash_digest_to_validate = argv[8];
>  
>  	if (strcmp(argv[9], "-")) {
>  		v->salt_size = strlen(argv[9]) / 2;
> @@ -1087,19 +1104,28 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>  		}
>  	}
>  
> -	argv += 10;
> -	argc -= 10;
> +	argv += DM_VERITY_MANDATORY_ARGS;
> +	argc -= DM_VERITY_MANDATORY_ARGS;

This cleanup should be in a separate patch in the series

>  
>  	/* Optional parameters */
>  	if (argc) {
>  		as.argc = argc;
>  		as.argv = argv;
>  
> -		r = verity_parse_opt_args(&as, v);
> +		r = verity_parse_opt_args(&as, v, &verify_args);
>  		if (r < 0)
>  			goto bad;
>  	}
>  
> +	/* Root hash signature is  a optional parameter*/
> +	r = verity_verify_root_hash(root_hash_digest_to_validate,
> +				    strlen(root_hash_digest_to_validate),
> +				    verify_args.sig,
> +				    verify_args.sig_size);
> +	if (r < 0) {
> +		ti->error = "Root hash verification failed";
> +		goto bad;
> +	}
>  	v->hash_per_block_bits =
>  		__fls((1 << v->hash_dev_block_bits) / v->digest_size);
>  
> @@ -1165,9 +1191,13 @@ static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv)
>  	ti->per_io_data_size = roundup(ti->per_io_data_size,
>  				       __alignof__(struct dm_verity_io));
>  
> +	verity_verify_sig_opts_cleanup(&verify_args);
> +
>  	return 0;
>  
>  bad:
> +
> +	verity_verify_sig_opts_cleanup(&verify_args);
>  	verity_dtr(ti);
>  
>  	return r;
> diff --git a/drivers/md/dm-verity-verify-sig.c b/drivers/md/dm-verity-verify-sig.c
> new file mode 100644
> index 000000000000..491c84eb58ef
> --- /dev/null
> +++ b/drivers/md/dm-verity-verify-sig.c
> @@ -0,0 +1,129 @@
> +// SPDX-License-Identifier: GPL-2.0
> +/*
> + * Copyright (C) 2019 Microsoft Corporation.
> + *
> + * Author:  Jaskaran Singh Khurana <jaskarankhurana@...ux.microsoft.com>
> + *
> + * This file is released under the GPLv2.
> + */
> +#include <linux/device-mapper.h>
> +#include <linux/verification.h>
> +#include "dm-verity.h"
> +#include "dm-verity-verify-sig.h"
> +
> +#define DM_VERITY_VERIFY_ERR(s) DM_VERITY_ROOT_HASH_VERIFICATION " " s
> +
> +bool verity_verify_is_sig_opt_arg(const char *arg_name)
> +{
> +	return (!strcasecmp(arg_name,
> +			    DM_VERITY_ROOT_HASH_VERIFICATION_OPT_SIG));
> +}
> +EXPORT_SYMBOL_GPL(verity_verify_is_sig_opt_arg);
> +
> +int verity_verify_sig_parse_opt_args(struct dm_arg_set *as,
> +				     struct dm_verity *v,
> +				     struct dm_verity_sig_opts *sig_opts,
> +				     unsigned int *argc,
> +				     const char *arg_name)
> +{
> +	const char *sig_size;
> +	const char *sig_buf;
> +	char dummy;
> +	struct dm_target *ti = v->ti;
> +	int r = 0;
> +
> +	if (*argc < DM_VERITY_ROOT_HASH_VERIFICATION_OPTS - 1) {
> +		ti->error = DM_VERITY_VERIFY_ERR("sig values not specified");

Can you can sig values to Signature values for readability

> +		return -EINVAL;
> +	}
> +
> +	sig_size = dm_shift_arg(as);
> +	(*argc)--;
> +
> +	if (strcasecmp(arg_name, DM_VERITY_ROOT_HASH_VERIFICATION_OPT_SIG) ||
> +	    sscanf(sig_size, "%u%c",
> +		   &sig_opts->sig_size, &dummy) != 1) {
> +		ti->error = DM_VERITY_VERIFY_ERR("invalid signature size");

Not sure why this is the best way to verifify the signature size

> +		return -EINVAL;
> +	}
> +
> +	sig_buf = dm_shift_arg(as);
> +	(*argc)--;
> +
> +	if (strlen(sig_buf) != sig_opts->sig_size * 2) {
> +		ti->error = DM_VERITY_VERIFY_ERR("sig buffer, size: mismatch");
> +		return -EINVAL;
> +	}

Can you explain the sig_opts->sig_size * 2 magic with a comment?

> +
> +	sig_opts->sig =	kmalloc(sig_opts->sig_size, GFP_KERNEL);
> +	if (!sig_opts->sig) {
> +		r = -ENOMEM;
> +		goto end;

Good to check for NULL, but GFP_KERNEL will OOM if allocations fail

> +	}
> +
> +	r = hex2bin(sig_opts->sig, sig_buf, sig_opts->sig_size);
> +
> +	if (r < 0) {
> +		ti->error = DM_VERITY_VERIFY_ERR("invalid roothash sig buf");
> +		r = -EINVAL;
> +		goto end;
> +	}
> +
> +end:
> +	if (r < 0)
> +		verity_verify_sig_opts_cleanup(sig_opts);
> +	return r;
> +}
> +EXPORT_SYMBOL_GPL(verity_verify_sig_parse_opt_args);
> +
> +#ifdef CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG
> +/*
> + * verify_verify_roothash - Verify the root hash of the verity hash device
> + *			     using builtin trusted keys.
> + *
> + * @root_hash: For verity, the roothash/data to be verified.
> + * @root_hash_len: Size of the roothash/data to be verified.
> + * @sig_data: The trusted signature that verifies the roothash/data.
> + * @sig_len: Size of the signature.
> + *
> + */
> +int verity_verify_root_hash(const void *root_hash, size_t root_hash_len,
> +			    const void *sig_data, size_t sig_len)
> +{
> +	int r;

ret?

> +
> +	if (!root_hash || root_hash_len == 0)
> +		return -EINVAL;
> +
> +	if (!sig_data  || sig_len == 0) {
> +		if (IS_ENABLED(CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_FORCE))
> +			return -EINVAL;
> +		else
> +			return 0;
> +	}
> +
> +	r = verify_pkcs7_signature(root_hash, root_hash_len, sig_data, sig_len,
> +				   NULL, VERIFYING_UNSPECIFIED_SIGNATURE, NULL,
> +				   NULL);
> +	if (r < 0)
> +		goto end;
> +
> +end:

goto end makes no sense if r is right down here, have you missed some code here?

Otherwise you can just remove the 4 lines above.

> +	return r;
> +}
> +#else
> +int verity_verify_root_hash(const void *root_hash, size_t root_hash_len,
> +			    const void *sig_data, size_t sig_len)
> +{
> +	return 0;
> +}
> +#endif
> +EXPORT_SYMBOL_GPL(verity_verify_root_hash);
> +
> +void verity_verify_sig_opts_cleanup(struct dm_verity_sig_opts *sig_opts)
> +{
> +	kfree(sig_opts->sig);
> +	sig_opts->sig = NULL;
> +	sig_opts->sig_size = 0;
> +}
> +EXPORT_SYMBOL_GPL(verity_verify_sig_opts_cleanup);
> diff --git a/drivers/md/dm-verity-verify-sig.h b/drivers/md/dm-verity-verify-sig.h
> new file mode 100644
> index 000000000000..411808624d7e
> --- /dev/null
> +++ b/drivers/md/dm-verity-verify-sig.h
> @@ -0,0 +1,32 @@
> +// SPDX-License-Identifier: GPL-2.0
> +/*
> + * Copyright (C) 2019 Microsoft Corporation.
> + *
> + * Author:  Jaskaran Singh Khurana <jaskarankhurana@...ux.microsoft.com>
> + *
> + * This file is released under the GPLv2.
> + */
> +#ifndef DM_VERITY_SIG_VERIFICATION_H
> +#define DM_VERITY_SIG_VERIFICATION_H
> +
> +#define DM_VERITY_ROOT_HASH_VERIFICATION	 "DM Verity Sig Verification"
> +#define DM_VERITY_ROOT_HASH_VERIFICATION_OPT_SIG "root_hash_sig"
> +#define DM_VERITY_ROOT_HASH_VERIFICATION_OPTS    3
> +
> +struct dm_verity_sig_opts {
> +	unsigned int sig_size;
> +	u8 *sig;
> +};
> +
> +int verity_verify_root_hash(const void *data, size_t data_len,
> +			    const void *sig_data, size_t sig_len);
> +
> +bool verity_verify_is_sig_opt_arg(const char *arg_name);
> +
> +int verity_verify_sig_parse_opt_args(struct dm_arg_set *as, struct dm_verity *v,
> +				     struct dm_verity_sig_opts *sig_opts,
> +				     unsigned int *argc, const char *arg_name);
> +
> +void verity_verify_sig_opts_cleanup(struct dm_verity_sig_opts *sig_opts);
> +
> +#endif /* DM_VERITY_SIG_VERIFICATION_H */

Balbir Singh.
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ