lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <60ab9d6a-6814-4612-9dc4-1b83f44336fe@linux.microsoft.com>
Date:   Thu, 2 Nov 2023 15:40:44 -0700
From:   Fan Wu <wufan@...ux.microsoft.com>
To:     Paul Moore <paul@...l-moore.com>, corbet@....net,
        zohar@...ux.ibm.com, jmorris@...ei.org, serge@...lyn.com,
        tytso@....edu, ebiggers@...nel.org, axboe@...nel.dk,
        agk@...hat.com, snitzer@...nel.org, eparis@...hat.com
Cc:     linux-doc@...r.kernel.org, linux-integrity@...r.kernel.org,
        linux-security-module@...r.kernel.org,
        linux-fscrypt@...r.kernel.org, linux-block@...r.kernel.org,
        dm-devel@...hat.com, audit@...r.kernel.org,
        roberto.sassu@...wei.com, linux-kernel@...r.kernel.org,
        Deven Bowers <deven.desai@...ux.microsoft.com>
Subject: Re: [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust
 provider



On 10/23/2023 8:52 PM, Paul Moore wrote:
> On Oct  4, 2023 Fan Wu <wufan@...ux.microsoft.com> wrote:
>>
>> Allows author of IPE policy to indicate trust for a singular dm-verity
>> volume, identified by roothash, through "dmverity_roothash" and all
>> signed dm-verity volumes, through "dmverity_signature".
>>
>> Signed-off-by: Deven Bowers <deven.desai@...ux.microsoft.com>
>> Signed-off-by: Fan Wu <wufan@...ux.microsoft.com>
>> ---
...
>>   security/ipe/Kconfig         |  18 +++++
>>   security/ipe/Makefile        |   1 +
>>   security/ipe/audit.c         |  31 +++++++-
>>   security/ipe/digest.c        | 142 +++++++++++++++++++++++++++++++++++
>>   security/ipe/digest.h        |  26 +++++++
>>   security/ipe/eval.c          | 101 ++++++++++++++++++++++++-
>>   security/ipe/eval.h          |  13 ++++
>>   security/ipe/hooks.c         |  51 +++++++++++++
>>   security/ipe/hooks.h         |   8 ++
>>   security/ipe/ipe.c           |  15 ++++
>>   security/ipe/ipe.h           |   4 +
>>   security/ipe/policy.h        |   3 +
>>   security/ipe/policy_parser.c |  24 +++++-
>>   13 files changed, 433 insertions(+), 4 deletions(-)
>>   create mode 100644 security/ipe/digest.c
>>   create mode 100644 security/ipe/digest.h
> 
> ...
> 
>> diff --git a/security/ipe/audit.c b/security/ipe/audit.c
>> index 0dd5f10c318f..b5c58655ac74 100644
>> --- a/security/ipe/audit.c
>> +++ b/security/ipe/audit.c
>> @@ -13,6 +13,7 @@
>>   #include "hooks.h"
>>   #include "policy.h"
>>   #include "audit.h"
>> +#include "digest.h"
>>   
>>   #define ACTSTR(x) ((x) == IPE_ACTION_ALLOW ? "ALLOW" : "DENY")
>>   
>> @@ -40,8 +41,29 @@ static const char *const audit_op_names[__IPE_OP_MAX] = {
>>   static const char *const audit_prop_names[__IPE_PROP_MAX] = {
>>   	"boot_verified=FALSE",
>>   	"boot_verified=TRUE",
>> +#ifdef CONFIG_IPE_PROP_DM_VERITY
>> +	"dmverity_roothash=",
>> +	"dmverity_signature=FALSE",
>> +	"dmverity_signature=TRUE",
>> +#endif /* CONFIG_IPE_PROP_DM_VERITY */
>>   };
>>   
>> +#ifdef CONFIG_IPE_PROP_DM_VERITY
>> +/**
>> + * audit_dmv_roothash - audit a roothash of a dmverity volume.
>> + * @ab: Supplies a pointer to the audit_buffer to append to.
>> + * @r: Supplies a pointer to the digest structure.
>> + */
>> +static void audit_dmv_roothash(struct audit_buffer *ab, const void *rh)
>> +{
>> +	ipe_digest_audit(ab, rh);
>> +}
>> +#else
>> +static void audit_dmv_roothash(struct audit_buffer *ab, const void *rh)
>> +{
>> +}
>> +#endif /* CONFIG_IPE_PROP_DM_VERITY */
> 
> Since the "dmverity_roothash=" field name is going to be written to
> the audit record regardless of CONFIG_IPE_PROP_DM_VERITY we should
> ensure that it has a value of "?" instead of nothing.  To fix that
> I would suggest something like this:
> 
>    #else
>    static void audit_dmv_roothash(struct audit_buffer *ab, const void *rh)
>    {
>      audit_log_format(ab, "?");
>    }
>    #endif /* CONFIG_IPE_PROP_DM_VERITY */
> 
>>   /**
>>    * audit_rule - audit an IPE policy rule approximation.
>>    * @ab: Supplies a pointer to the audit_buffer to append to.
>> @@ -53,8 +75,13 @@ static void audit_rule(struct audit_buffer *ab, const struct ipe_rule *r)
>>   
>>   	audit_log_format(ab, "rule=\"op=%s ", audit_op_names[r->op]);
>>   
>> -	list_for_each_entry(ptr, &r->props, next)
>> -		audit_log_format(ab, "%s ", audit_prop_names[ptr->type]);
>> +	list_for_each_entry(ptr, &r->props, next) {
>> +		audit_log_format(ab, "%s", audit_prop_names[ptr->type]);
>> +		if (ptr->type == IPE_PROP_DMV_ROOTHASH)
>> +			audit_dmv_roothash(ab, ptr->value);
> 
> If you wanted to avoid the roothash change above, you could change the
> code here so it didn't always write "dmverity_roothash=" into the audit
> record.
> 
Yes this sounds more reasonable to me, I will change this part to a 
switch case statement to avoid unnessary logging.

>> +		audit_log_format(ab, " ");
>> +	}
>>   
>>   	audit_log_format(ab, "action=%s\"", ACTSTR(r->action));
>>   }
>> diff --git a/security/ipe/digest.c b/security/ipe/digest.c
>> new file mode 100644
>> index 000000000000..7a42ca71880c
>> --- /dev/null
>> +++ b/security/ipe/digest.c
>> @@ -0,0 +1,142 @@
>> +// SPDX-License-Identifier: GPL-2.0
>> +/*
>> + * Copyright (C) Microsoft Corporation. All rights reserved.
>> + */
>> +
>> +#include "digest.h"
>> +
>> +/**
>> + * ipe_digest_parse - parse a digest in IPE's policy.
>> + * @valstr: Supplies the string parsed from the policy.
>> + * @value: Supplies a pointer to be populated with the result.
>> + *
>> + * Digests in IPE are defined in a standard way:
>> + *	<alg_name>:<hex>
>> + *
>> + * Use this function to create a property to parse the digest
>> + * consistently. The parsed digest will be saved in @value in IPE's
>> + * policy.
>> + *
>> + * Return:
>> + * * 0	- OK
>> + * * !0	- Error
>> + */
>> +int ipe_digest_parse(const char *valstr, void **value)
> 
> Why is @value void?  You should make it a digest_info type or simply
> skip the second parameter and return a digest_info pointer.
>
Yes it should better just return a digest_info type pointer. I will 
update this part.

>> +{
>> +	char *sep, *raw_digest;
>> +	size_t raw_digest_len;
>> +	int rc = 0;
>> +	u8 *digest = NULL;
>> +	struct digest_info *info = NULL;
>> +
>> +	info = kzalloc(sizeof(*info), GFP_KERNEL);
>> +	if (!info)
>> +		return -ENOMEM;
>> +
>> +	sep = strchr(valstr, ':');
>> +	if (!sep) {
>> +		rc = -EBADMSG;
>> +		goto err;
>> +	}
>> +
>> +	info->alg = kstrndup(valstr, sep - valstr, GFP_KERNEL);
>> +	if (!info->alg) {
>> +		rc = -ENOMEM;
>> +		goto err;
>> +	}
>> +
>> +	raw_digest = sep + 1;
>> +	raw_digest_len = strlen(raw_digest);
>> +	info->raw_digest = kstrndup(raw_digest, raw_digest_len, GFP_KERNEL);
> 
> Since you're running a strlen() over @raw_digest, you might as well
> just use kstrdup() instead of kstrndup().
>
Thanks I will update this part.

>> +	if (!info->raw_digest) {
>> +		rc = -ENOMEM;
>> +		goto err_free_alg;
>> +	}
>> +
>> +	info->digest_len = (raw_digest_len + 1) / 2;
>> +	digest = kzalloc(info->digest_len, GFP_KERNEL);
>> +	if (!digest) {
>> +		rc = -ENOMEM;
>> +		goto err_free_raw;
>> +	}
>> +
>> +	rc = hex2bin(digest, raw_digest, info->digest_len);
>> +	if (rc < 0) {
>> +		rc = -EINVAL;
>> +		goto err_free_raw;
>> +	}
>> +
>> +	info->digest = digest;
>> +	*value = info;
>> +	return 0;
>> +
>> +err_free_raw:
>> +	kfree(info->raw_digest);
>> +err_free_alg:
>> +	kfree(info->alg);
>> +err:
>> +	kfree(digest);
>> +	kfree(info);
>> +	return rc;
>> +}
>> +
>> +/**
>> + * ipe_digest_eval - evaluate an IPE digest against another digest.
>> + * @expect: Supplies the policy-provided digest value.
>> + * @digest: Supplies the digest to compare against the policy digest value.
>> + * @digest_len: The length of @digest.
>> + * @alg: Supplies the name of the algorithm used to calculated @digest.
>> + *
>> + * Return:
>> + * * true	- digests match
>> + * * false	- digests do not match
>> + */
>> +bool ipe_digest_eval(const void *expect, const u8 *digest, size_t digest_len,
>> +		     const char *alg)
> 
> Similar to the above, why not make the @expect parameter a digest_info
> type?  Also, why not pass a second digest_info parameter instead of
> a separate @digest, @digest_len, and @alg?
> 
The digest_info was inteneded to be used for policy only, which also 
contains a raw string of digest in the policy that can be used during 
audit. After second thought I start to think the raw_digest seems 
unnecessary and I can refactor them all to use digest_info instead.

>> +{
>> +	const struct digest_info *info = (struct digest_info *)expect;
>> +
>> +	return (digest_len == info->digest_len) && !strcmp(alg, info->alg) &&
>> +	       (!memcmp(info->digest, digest, info->digest_len));
>> +}
>> +
>> +/**
>> + * ipe_digest_free - free an IPE digest.
>> + * @value: Supplies a pointer the policy-provided digest value to free.
>> + */
>> +void ipe_digest_free(void **value)
> 
> Another digest_info parameter/type issue.
> 
>> +{
>> +	struct digest_info *info = (struct digest_info *)(*value);
>> +
>> +	if (IS_ERR_OR_NULL(info))
>> +		return;
>> +
>> +	kfree(info->alg);
>> +	kfree(info->raw_digest);
>> +	kfree(info->digest);
>> +	kfree(info);
>> +}
>> +
>> +/**
>> + * ipe_digest_audit - audit a digest that was sourced from IPE's policy.
>> + * @ab: Supplies the audit_buffer to append the formatted result.
>> + * @val: Supplies a pointer to source the audit record from.
>> + *
>> + * Digests in IPE are defined in a standard way:
>> + *	<alg_name>:<hex>
>> + *
>> + * Use this function to create a property to audit the digest
>> + * consistently.
>> + *
>> + * Return:
>> + * 0 - OK
>> + * !0 - Error
>> + */
>> +void ipe_digest_audit(struct audit_buffer *ab, const void *val)
> 
> Another digest_info parameter/type issue.
> 
>> +{
>> +	const struct digest_info *info = (struct digest_info *)val;
>> +
>> +	audit_log_untrustedstring(ab, info->alg);
>> +	audit_log_format(ab, ":");
>> +	audit_log_untrustedstring(ab, info->raw_digest);
>> +}
> 
> ...
> 
>> diff --git a/security/ipe/eval.c b/security/ipe/eval.c
>> index 78c54ff1fdd3..82ad48d7aa3d 100644
>> --- a/security/ipe/eval.c
>> +++ b/security/ipe/eval.c
>> @@ -69,15 +88,89 @@ void build_eval_ctx(struct ipe_eval_ctx *ctx,
>>   		    const struct file *file,
>>   		    enum ipe_op_type op)
>>   {
>> +	struct inode *ino = NULL;
>> +
>>   	if (op == IPE_OP_EXEC && file)
>>   		pin_sb(FILE_SUPERBLOCK(file));
>>   
>>   	ctx->file = file;
>>   	ctx->op = op;
>>   
>> -	if (file)
>> +	if (file) {
>>   		ctx->from_init_sb = from_pinned(FILE_SUPERBLOCK(file));
>> +		ino = d_real_inode(file->f_path.dentry);
>> +		build_ipe_bdev_ctx(ctx, ino);
> 
> You don't need @ino.
> 
>    build_ipe_bdev_ctx(ctx, d_real_inode(file->f_path.dentry));
> 
This variable will make sense in the fsverity patch, I do agree it 
doesn't make sense for this one. Will remove it.

>> +	}
>> +}
>> +
>> +#ifdef CONFIG_IPE_PROP_DM_VERITY
>> +/**
>> + * evaluate_dmv_roothash - Evaluate @ctx against a dmv roothash property.
>> + * @ctx: Supplies a pointer to the context being evaluated.
>> + * @p: Supplies a pointer to the property being evaluated.
>> + *
>> + * Return:
>> + * * true	- The current @ctx match the @p
>> + * * false	- The current @ctx doesn't match the @p
>> + */
>> +static bool evaluate_dmv_roothash(const struct ipe_eval_ctx *const ctx,
>> +				  struct ipe_prop *p)
>> +{
>> +	return !!ctx->ipe_bdev &&
>> +	       ipe_digest_eval(p->value,
>> +			       ctx->ipe_bdev->digest,
>> +			       ctx->ipe_bdev->digest_len,
>> +			       ctx->ipe_bdev->digest_algo);
> 
> Building on my comments above in ipe_digest_eval(), if you convert it
> to use digest_info structs this is simplified:
> 
>    ipe_digest_eval(p->vlaue, ctx->ipe_bdev)
> 
Yep but the seucrity blob also contains signature information. I will 
make it like ipe_digest_eval(p->vlaue, ctx->ipe_bdev->dmv_digest_info)

>> +}
>> +
>> +/**
>> + * evaluate_dmv_sig_false: Analyze @ctx against a dmv sig false property.
>> + * @ctx: Supplies a pointer to the context being evaluated.
>> + * @p: Supplies a pointer to the property being evaluated.
>> + *
>> + * Return:
>> + * * true	- The current @ctx match the @p
>> + * * false	- The current @ctx doesn't match the @p
>> + */
>> +static bool evaluate_dmv_sig_false(const struct ipe_eval_ctx *const ctx,
>> +				   struct ipe_prop *p)
>> +{
>> +	return !ctx->ipe_bdev || (!ctx->ipe_bdev->dm_verity_signed);
>> +}
>> +
>> +/**
>> + * evaluate_dmv_sig_true: Analyze @ctx against a dmv sig true property.
>> + * @ctx: Supplies a pointer to the context being evaluated.
>> + * @p: Supplies a pointer to the property being evaluated.
>> + *
>> + * Return:
>> + * * true	- The current @ctx match the @p
>> + * * false	- The current @ctx doesn't match the @p
>> + */
>> +static bool evaluate_dmv_sig_true(const struct ipe_eval_ctx *const ctx,
>> +				  struct ipe_prop *p)
>> +{
>> +	return ctx->ipe_bdev && (!!ctx->ipe_bdev->dm_verity_signed);
>> +}
> 
> Do you need both evaluate_dmv_sig_true() and evaluate_dmv_sig_false()?
> If yes, you should make one call the other and return the inverse to
> help ensure there are no oddities.
>
Yes this code is redundant. I also found the ipe_prop *p variable is 
necssary. Will clean them up in the next version.

>> diff --git a/security/ipe/hooks.c b/security/ipe/hooks.c
>> index e9386762a597..8b8031e66f36 100644
>> --- a/security/ipe/hooks.c
>> +++ b/security/ipe/hooks.c
>> @@ -193,3 +196,51 @@ void ipe_sb_free_security(struct super_block *mnt_sb)
>>   {
>>   	ipe_invalidate_pinned_sb(mnt_sb);
>>   }
>> +
>> +#ifdef CONFIG_IPE_PROP_DM_VERITY
>> +/**
>> + * ipe_bdev_free_security - free IPE's LSM blob of block_devices.
>> + * @bdev: Supplies a pointer to a block_device that contains the structure
>> + *	  to free.
>> + */
>> +void ipe_bdev_free_security(struct block_device *bdev)
>> +{
>> +	struct ipe_bdev *blob = ipe_bdev(bdev);
>> +
>> +	kfree(blob->digest);
>> +	kfree(blob->digest_algo);
>> +}
>> +
>> +/**
>> + * ipe_bdev_setsecurity - save data from a bdev to IPE's LSM blob.
>> + * @bdev: Supplies a pointer to a block_device that contains the LSM blob.
>> + * @key: Supplies the string key that uniquely identifies the value.
>> + * @value: Supplies the value to store.
>> + * @len: The length of @value.
>> + */
>> +int ipe_bdev_setsecurity(struct block_device *bdev, const char *key,
>> +			 const void *value, size_t len)
>> +{
>> +	struct ipe_bdev *blob = ipe_bdev(bdev);
>> +
>> +	if (!strcmp(key, DM_VERITY_ROOTHASH_SEC_NAME)) {
>> +		const struct dm_verity_digest *digest = value;
>> +
>> +		blob->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL);
>> +		if (!blob->digest)
>> +			return -ENOMEM;
>> +
>> +		blob->digest_algo = kstrdup_const(digest->algo, GFP_KERNEL);
>> +		if (!blob->digest_algo)
>> +			return -ENOMEM;
> 
> You need to cleanup @blob on error so you don't leak ipe_bdev::digest.
>
Thanks for catching that. I will fix this.

-Fan
>> +		blob->digest_len = digest->digest_len;
>> +		return 0;
>> +	} else if (!strcmp(key, DM_VERITY_SIGNATURE_SEC_NAME)) {
>> +		blob->dm_verity_signed = true;
>> +		return 0;
>> +	}
>> +
>> +	return -EOPNOTSUPP;
>> +}
>> +#endif /* CONFIG_IPE_PROP_DM_VERITY */
> 
> --
> paul-moore.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ