2019-07-23 00:26:23 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
2020-11-14 05:19:15 +08:00
|
|
|
* Verification of builtin signatures
|
2019-07-23 00:26:23 +08:00
|
|
|
*
|
|
|
|
* Copyright 2019 Google LLC
|
|
|
|
*/
|
|
|
|
|
fsverity: improve documentation for builtin signature support
fsverity builtin signatures (CONFIG_FS_VERITY_BUILTIN_SIGNATURES) aren't
the only way to do signatures with fsverity, and they have some major
limitations. Yet, more users have tried to use them, e.g. recently by
https://github.com/ostreedev/ostree/pull/2640. In most cases this seems
to be because users aren't sufficiently familiar with the limitations of
this feature and what the alternatives are.
Therefore, make some updates to the documentation to try to clarify the
properties of this feature and nudge users in the right direction.
Note that the Integrity Policy Enforcement (IPE) LSM, which is not yet
upstream, is planned to use the builtin signatures. (This differs from
IMA, which uses its own signature mechanism.) For that reason, my
earlier patch "fsverity: mark builtin signatures as deprecated"
(https://lore.kernel.org/r/20221208033548.122704-1-ebiggers@kernel.org),
which marked builtin signatures as "deprecated", was controversial.
This patch therefore stops short of marking the feature as deprecated.
I've also revised the language to focus on better explaining the feature
and what its alternatives are.
Link: https://lore.kernel.org/r/20230620041937.5809-1-ebiggers@kernel.org
Reviewed-by: Colin Walters <walters@verbum.org>
Reviewed-by: Luca Boccassi <bluca@debian.org>
Signed-off-by: Eric Biggers <ebiggers@google.com>
2023-06-20 12:19:37 +08:00
|
|
|
/*
|
|
|
|
* This file implements verification of fs-verity builtin signatures. Please
|
|
|
|
* take great care before using this feature. It is not the only way to do
|
|
|
|
* signatures with fs-verity, and the alternatives (such as userspace signature
|
|
|
|
* verification, and IMA appraisal) can be much better. For details about the
|
|
|
|
* limitations of this feature, see Documentation/filesystems/fsverity.rst.
|
|
|
|
*/
|
|
|
|
|
2019-07-23 00:26:23 +08:00
|
|
|
#include "fsverity_private.h"
|
|
|
|
|
|
|
|
#include <linux/cred.h>
|
|
|
|
#include <linux/key.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/verification.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* /proc/sys/fs/verity/require_signatures
|
|
|
|
* If 1, all verity files must have a valid builtin signature.
|
|
|
|
*/
|
|
|
|
static int fsverity_require_signatures;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Keyring that contains the trusted X.509 certificates.
|
|
|
|
*
|
|
|
|
* Only root (kuid=0) can modify this. Also, root may use
|
|
|
|
* keyctl_restrict_keyring() to prevent any more additions.
|
|
|
|
*/
|
|
|
|
static struct key *fsverity_keyring;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* fsverity_verify_signature() - check a verity file's signature
|
2020-05-12 03:21:17 +08:00
|
|
|
* @vi: the file's fsverity_info
|
2021-01-16 02:18:15 +08:00
|
|
|
* @signature: the file's built-in signature
|
|
|
|
* @sig_size: size of signature in bytes, or 0 if no signature
|
2019-07-23 00:26:23 +08:00
|
|
|
*
|
2021-01-16 02:18:15 +08:00
|
|
|
* If the file includes a signature of its fs-verity file digest, verify it
|
|
|
|
* against the certificates in the fs-verity keyring.
|
2019-07-23 00:26:23 +08:00
|
|
|
*
|
|
|
|
* Return: 0 on success (signature valid or not required); -errno on failure
|
|
|
|
*/
|
|
|
|
int fsverity_verify_signature(const struct fsverity_info *vi,
|
2021-01-16 02:18:15 +08:00
|
|
|
const u8 *signature, size_t sig_size)
|
2019-07-23 00:26:23 +08:00
|
|
|
{
|
|
|
|
const struct inode *inode = vi->inode;
|
|
|
|
const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg;
|
2020-11-14 05:19:16 +08:00
|
|
|
struct fsverity_formatted_digest *d;
|
2019-07-23 00:26:23 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
if (sig_size == 0) {
|
|
|
|
if (fsverity_require_signatures) {
|
|
|
|
fsverity_err(inode,
|
|
|
|
"require_signatures=1, rejecting unsigned file!");
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL);
|
|
|
|
if (!d)
|
|
|
|
return -ENOMEM;
|
|
|
|
memcpy(d->magic, "FSVerity", 8);
|
|
|
|
d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs);
|
|
|
|
d->digest_size = cpu_to_le16(hash_alg->digest_size);
|
2020-11-14 05:19:17 +08:00
|
|
|
memcpy(d->digest, vi->file_digest, hash_alg->digest_size);
|
2019-07-23 00:26:23 +08:00
|
|
|
|
|
|
|
err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size,
|
2021-01-16 02:18:15 +08:00
|
|
|
signature, sig_size, fsverity_keyring,
|
2019-07-23 00:26:23 +08:00
|
|
|
VERIFYING_UNSPECIFIED_SIGNATURE,
|
|
|
|
NULL, NULL);
|
|
|
|
kfree(d);
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
if (err == -ENOKEY)
|
|
|
|
fsverity_err(inode,
|
|
|
|
"File's signing cert isn't in the fs-verity keyring");
|
|
|
|
else if (err == -EKEYREJECTED)
|
|
|
|
fsverity_err(inode, "Incorrect file signature");
|
|
|
|
else if (err == -EBADMSG)
|
|
|
|
fsverity_err(inode, "Malformed file signature");
|
|
|
|
else
|
|
|
|
fsverity_err(inode, "Error %d verifying file signature",
|
|
|
|
err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
static struct ctl_table_header *fsverity_sysctl_header;
|
|
|
|
|
|
|
|
static struct ctl_table fsverity_sysctl_table[] = {
|
|
|
|
{
|
|
|
|
.procname = "require_signatures",
|
|
|
|
.data = &fsverity_require_signatures,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_minmax,
|
|
|
|
.extra1 = SYSCTL_ZERO,
|
|
|
|
.extra2 = SYSCTL_ONE,
|
|
|
|
},
|
|
|
|
{ }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init fsverity_sysctl_init(void)
|
|
|
|
{
|
2023-03-03 04:28:24 +08:00
|
|
|
fsverity_sysctl_header = register_sysctl("fs/verity", fsverity_sysctl_table);
|
2019-07-23 00:26:23 +08:00
|
|
|
if (!fsverity_sysctl_header) {
|
|
|
|
pr_err("sysctl registration failed!\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#else /* !CONFIG_SYSCTL */
|
|
|
|
static inline int __init fsverity_sysctl_init(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif /* !CONFIG_SYSCTL */
|
|
|
|
|
|
|
|
int __init fsverity_init_signature(void)
|
|
|
|
{
|
|
|
|
struct key *ring;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
ring = keyring_alloc(".fs-verity", KUIDT_INIT(0), KGIDT_INIT(0),
|
|
|
|
current_cred(), KEY_POS_SEARCH |
|
|
|
|
KEY_USR_VIEW | KEY_USR_READ | KEY_USR_WRITE |
|
|
|
|
KEY_USR_SEARCH | KEY_USR_SETATTR,
|
|
|
|
KEY_ALLOC_NOT_IN_QUOTA, NULL, NULL);
|
|
|
|
if (IS_ERR(ring))
|
|
|
|
return PTR_ERR(ring);
|
|
|
|
|
|
|
|
err = fsverity_sysctl_init();
|
|
|
|
if (err)
|
|
|
|
goto err_put_ring;
|
|
|
|
|
|
|
|
fsverity_keyring = ring;
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err_put_ring:
|
|
|
|
key_put(ring);
|
|
|
|
return err;
|
|
|
|
}
|