KEYS: Move the point of trust determination to __key_link()
Move the point at which a key is determined to be trustworthy to __key_link() so that we use the contents of the keyring being linked in to to determine whether the key being linked in is trusted or not. What is 'trusted' then becomes a matter of what's in the keyring. Currently, the test is done when the key is parsed, but given that at that point we can only sensibly refer to the contents of the system trusted keyring, we can only use that as the basis for working out the trustworthiness of a new key. With this change, a trusted keyring is a set of keys that once the trusted-only flag is set cannot be added to except by verification through one of the contained keys. Further, adding a key into a trusted keyring, whilst it might grant trustworthiness in the context of that keyring, does not automatically grant trustworthiness in the context of a second keyring to which it could be secondarily linked. To accomplish this, the authentication data associated with the key source must now be retained. For an X.509 cert, this means the contents of the AuthorityKeyIdentifier and the signature data. If system keyrings are disabled then restrict_link_by_builtin_trusted() resolves to restrict_link_reject(). The integrity digital signature code still works correctly with this as it was previously using KEY_FLAG_TRUSTED_ONLY, which doesn't permit anything to be added if there is no system keyring against which trust can be determined. Signed-off-by: David Howells <dhowells@redhat.com>
This commit is contained in:
parent
99716b7cae
commit
a511e1af8b
|
@ -18,12 +18,26 @@
|
||||||
#include <keys/system_keyring.h>
|
#include <keys/system_keyring.h>
|
||||||
#include <crypto/pkcs7.h>
|
#include <crypto/pkcs7.h>
|
||||||
|
|
||||||
struct key *system_trusted_keyring;
|
static struct key *system_trusted_keyring;
|
||||||
EXPORT_SYMBOL_GPL(system_trusted_keyring);
|
|
||||||
|
|
||||||
extern __initconst const u8 system_certificate_list[];
|
extern __initconst const u8 system_certificate_list[];
|
||||||
extern __initconst const unsigned long system_certificate_list_size;
|
extern __initconst const unsigned long system_certificate_list_size;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* restrict_link_by_builtin_trusted - Restrict keyring addition by system CA
|
||||||
|
*
|
||||||
|
* Restrict the addition of keys into a keyring based on the key-to-be-added
|
||||||
|
* being vouched for by a key in the system keyring.
|
||||||
|
*/
|
||||||
|
int restrict_link_by_builtin_trusted(struct key *keyring,
|
||||||
|
const struct key_type *type,
|
||||||
|
unsigned long flags,
|
||||||
|
const union key_payload *payload)
|
||||||
|
{
|
||||||
|
return restrict_link_by_signature(system_trusted_keyring,
|
||||||
|
type, payload);
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Load the compiled-in keys
|
* Load the compiled-in keys
|
||||||
*/
|
*/
|
||||||
|
@ -37,7 +51,7 @@ static __init int system_trusted_keyring_init(void)
|
||||||
((KEY_POS_ALL & ~KEY_POS_SETATTR) |
|
((KEY_POS_ALL & ~KEY_POS_SETATTR) |
|
||||||
KEY_USR_VIEW | KEY_USR_READ | KEY_USR_SEARCH),
|
KEY_USR_VIEW | KEY_USR_READ | KEY_USR_SEARCH),
|
||||||
KEY_ALLOC_NOT_IN_QUOTA,
|
KEY_ALLOC_NOT_IN_QUOTA,
|
||||||
keyring_restrict_trusted_only, NULL);
|
restrict_link_by_builtin_trusted, NULL);
|
||||||
if (IS_ERR(system_trusted_keyring))
|
if (IS_ERR(system_trusted_keyring))
|
||||||
panic("Can't allocate system trusted keyring\n");
|
panic("Can't allocate system trusted keyring\n");
|
||||||
return 0;
|
return 0;
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/* Instantiate a public key crypto key from an X.509 Certificate
|
/* Instantiate a public key crypto key from an X.509 Certificate
|
||||||
*
|
*
|
||||||
* Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
|
* Copyright (C) 2012, 2016 Red Hat, Inc. All Rights Reserved.
|
||||||
* Written by David Howells (dhowells@redhat.com)
|
* Written by David Howells (dhowells@redhat.com)
|
||||||
*
|
*
|
||||||
* This program is free software; you can redistribute it and/or
|
* This program is free software; you can redistribute it and/or
|
||||||
|
@ -9,20 +9,12 @@
|
||||||
* 2 of the Licence, or (at your option) any later version.
|
* 2 of the Licence, or (at your option) any later version.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#define pr_fmt(fmt) "X.509: "fmt
|
#define pr_fmt(fmt) "ASYM: "fmt
|
||||||
#include <linux/module.h>
|
#include <linux/module.h>
|
||||||
#include <linux/kernel.h>
|
#include <linux/kernel.h>
|
||||||
#include <linux/slab.h>
|
|
||||||
#include <linux/err.h>
|
#include <linux/err.h>
|
||||||
#include <linux/mpi.h>
|
|
||||||
#include <linux/asn1_decoder.h>
|
|
||||||
#include <keys/asymmetric-subtype.h>
|
|
||||||
#include <keys/asymmetric-parser.h>
|
|
||||||
#include <keys/system_keyring.h>
|
|
||||||
#include <crypto/hash.h>
|
|
||||||
#include <crypto/public_key.h>
|
#include <crypto/public_key.h>
|
||||||
#include "asymmetric_keys.h"
|
#include "asymmetric_keys.h"
|
||||||
#include "x509_parser.h"
|
|
||||||
|
|
||||||
static bool use_builtin_keys;
|
static bool use_builtin_keys;
|
||||||
static struct asymmetric_key_id *ca_keyid;
|
static struct asymmetric_key_id *ca_keyid;
|
||||||
|
@ -62,45 +54,55 @@ static int __init ca_keys_setup(char *str)
|
||||||
__setup("ca_keys=", ca_keys_setup);
|
__setup("ca_keys=", ca_keys_setup);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/*
|
/**
|
||||||
|
* restrict_link_by_signature - Restrict additions to a ring of public keys
|
||||||
|
* @trust_keyring: A ring of keys that can be used to vouch for the new cert.
|
||||||
|
* @type: The type of key being added.
|
||||||
|
* @payload: The payload of the new key.
|
||||||
|
*
|
||||||
* Check the new certificate against the ones in the trust keyring. If one of
|
* Check the new certificate against the ones in the trust keyring. If one of
|
||||||
* those is the signing key and validates the new certificate, then mark the
|
* those is the signing key and validates the new certificate, then mark the
|
||||||
* new certificate as being trusted.
|
* new certificate as being trusted.
|
||||||
*
|
*
|
||||||
* Return 0 if the new certificate was successfully validated, 1 if we couldn't
|
* Returns 0 if the new certificate was accepted, -ENOKEY if we couldn't find a
|
||||||
* find a matching parent certificate in the trusted list and an error if there
|
* matching parent certificate in the trusted list, -EKEYREJECTED if the
|
||||||
* is a matching certificate but the signature check fails.
|
* signature check fails or the key is blacklisted and some other error if
|
||||||
|
* there is a matching certificate but the signature check cannot be performed.
|
||||||
*/
|
*/
|
||||||
int x509_validate_trust(struct x509_certificate *cert,
|
int restrict_link_by_signature(struct key *trust_keyring,
|
||||||
struct key *trust_keyring)
|
const struct key_type *type,
|
||||||
|
const union key_payload *payload)
|
||||||
{
|
{
|
||||||
struct public_key_signature *sig = cert->sig;
|
const struct public_key_signature *sig;
|
||||||
struct key *key;
|
struct key *key;
|
||||||
int ret = 1;
|
int ret;
|
||||||
|
|
||||||
if (!sig->auth_ids[0] && !sig->auth_ids[1])
|
pr_devel("==>%s()\n", __func__);
|
||||||
return 1;
|
|
||||||
|
|
||||||
if (!trust_keyring)
|
if (!trust_keyring)
|
||||||
|
return -ENOKEY;
|
||||||
|
|
||||||
|
if (type != &key_type_asymmetric)
|
||||||
return -EOPNOTSUPP;
|
return -EOPNOTSUPP;
|
||||||
|
|
||||||
|
sig = payload->data[asym_auth];
|
||||||
|
if (!sig->auth_ids[0] && !sig->auth_ids[1])
|
||||||
|
return 0;
|
||||||
|
|
||||||
if (ca_keyid && !asymmetric_key_id_partial(sig->auth_ids[1], ca_keyid))
|
if (ca_keyid && !asymmetric_key_id_partial(sig->auth_ids[1], ca_keyid))
|
||||||
return -EPERM;
|
return -EPERM;
|
||||||
if (cert->unsupported_sig)
|
|
||||||
return -ENOPKG;
|
|
||||||
|
|
||||||
|
/* See if we have a key that signed this one. */
|
||||||
key = find_asymmetric_key(trust_keyring,
|
key = find_asymmetric_key(trust_keyring,
|
||||||
sig->auth_ids[0], sig->auth_ids[1],
|
sig->auth_ids[0], sig->auth_ids[1],
|
||||||
false);
|
false);
|
||||||
if (IS_ERR(key))
|
if (IS_ERR(key))
|
||||||
return PTR_ERR(key);
|
return -ENOKEY;
|
||||||
|
|
||||||
if (!use_builtin_keys ||
|
if (use_builtin_keys && !test_bit(KEY_FLAG_BUILTIN, &key->flags))
|
||||||
test_bit(KEY_FLAG_BUILTIN, &key->flags)) {
|
ret = -ENOKEY;
|
||||||
ret = verify_signature(key, cert->sig);
|
else
|
||||||
if (ret == -ENOPKG)
|
ret = verify_signature(key, sig);
|
||||||
cert->unsupported_sig = true;
|
|
||||||
}
|
|
||||||
key_put(key);
|
key_put(key);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
EXPORT_SYMBOL_GPL(x509_validate_trust);
|
|
||||||
|
|
|
@ -58,9 +58,3 @@ extern int x509_decode_time(time64_t *_t, size_t hdrlen,
|
||||||
*/
|
*/
|
||||||
extern int x509_get_sig_params(struct x509_certificate *cert);
|
extern int x509_get_sig_params(struct x509_certificate *cert);
|
||||||
extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
||||||
|
|
||||||
/*
|
|
||||||
* public_key_trust.c
|
|
||||||
*/
|
|
||||||
extern int x509_validate_trust(struct x509_certificate *cert,
|
|
||||||
struct key *trust_keyring);
|
|
||||||
|
|
|
@ -178,31 +178,12 @@ static int x509_key_preparse(struct key_preparsed_payload *prep)
|
||||||
|
|
||||||
cert->pub->id_type = "X509";
|
cert->pub->id_type = "X509";
|
||||||
|
|
||||||
/* See if we can derive the trustability of this certificate.
|
if (cert->unsupported_sig) {
|
||||||
*
|
|
||||||
* When it comes to self-signed certificates, we cannot evaluate
|
|
||||||
* trustedness except by the fact that we obtained it from a trusted
|
|
||||||
* location. So we just rely on x509_validate_trust() failing in this
|
|
||||||
* case.
|
|
||||||
*
|
|
||||||
* Note that there's a possibility of a self-signed cert matching a
|
|
||||||
* cert that we have (most likely a duplicate that we already trust) -
|
|
||||||
* in which case it will be marked trusted.
|
|
||||||
*/
|
|
||||||
if (cert->unsupported_sig || cert->self_signed) {
|
|
||||||
public_key_signature_free(cert->sig);
|
public_key_signature_free(cert->sig);
|
||||||
cert->sig = NULL;
|
cert->sig = NULL;
|
||||||
} else {
|
} else {
|
||||||
pr_devel("Cert Signature: %s + %s\n",
|
pr_devel("Cert Signature: %s + %s\n",
|
||||||
cert->sig->pkey_algo, cert->sig->hash_algo);
|
cert->sig->pkey_algo, cert->sig->hash_algo);
|
||||||
|
|
||||||
ret = x509_validate_trust(cert, get_system_trusted_keyring());
|
|
||||||
if (ret)
|
|
||||||
ret = x509_validate_trust(cert, get_ima_mok_keyring());
|
|
||||||
if (ret == -EKEYREJECTED)
|
|
||||||
goto error_free_cert;
|
|
||||||
if (!ret)
|
|
||||||
prep->trusted = true;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Propose a description */
|
/* Propose a description */
|
||||||
|
|
|
@ -47,6 +47,13 @@ extern void public_key_signature_free(struct public_key_signature *sig);
|
||||||
extern struct asymmetric_key_subtype public_key_subtype;
|
extern struct asymmetric_key_subtype public_key_subtype;
|
||||||
|
|
||||||
struct key;
|
struct key;
|
||||||
|
struct key_type;
|
||||||
|
union key_payload;
|
||||||
|
|
||||||
|
extern int restrict_link_by_signature(struct key *trust_keyring,
|
||||||
|
const struct key_type *type,
|
||||||
|
const union key_payload *payload);
|
||||||
|
|
||||||
extern int verify_signature(const struct key *key,
|
extern int verify_signature(const struct key *key,
|
||||||
const struct public_key_signature *sig);
|
const struct public_key_signature *sig);
|
||||||
|
|
||||||
|
|
|
@ -12,22 +12,17 @@
|
||||||
#ifndef _KEYS_SYSTEM_KEYRING_H
|
#ifndef _KEYS_SYSTEM_KEYRING_H
|
||||||
#define _KEYS_SYSTEM_KEYRING_H
|
#define _KEYS_SYSTEM_KEYRING_H
|
||||||
|
|
||||||
|
#include <linux/key.h>
|
||||||
|
|
||||||
#ifdef CONFIG_SYSTEM_TRUSTED_KEYRING
|
#ifdef CONFIG_SYSTEM_TRUSTED_KEYRING
|
||||||
|
|
||||||
#include <linux/key.h>
|
extern int restrict_link_by_builtin_trusted(struct key *keyring,
|
||||||
#include <linux/verification.h>
|
const struct key_type *type,
|
||||||
#include <crypto/public_key.h>
|
unsigned long flags,
|
||||||
|
const union key_payload *payload);
|
||||||
|
|
||||||
extern struct key *system_trusted_keyring;
|
|
||||||
static inline struct key *get_system_trusted_keyring(void)
|
|
||||||
{
|
|
||||||
return system_trusted_keyring;
|
|
||||||
}
|
|
||||||
#else
|
#else
|
||||||
static inline struct key *get_system_trusted_keyring(void)
|
#define restrict_link_by_builtin_trusted restrict_link_reject
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef CONFIG_IMA_MOK_KEYRING
|
#ifdef CONFIG_IMA_MOK_KEYRING
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
#include <linux/kernel.h>
|
#include <linux/kernel.h>
|
||||||
#include <linux/errno.h>
|
#include <linux/errno.h>
|
||||||
#include <linux/string.h>
|
#include <linux/string.h>
|
||||||
#include <keys/system_keyring.h>
|
#include <linux/verification.h>
|
||||||
#include <crypto/public_key.h>
|
#include <crypto/public_key.h>
|
||||||
#include "module-internal.h"
|
#include "module-internal.h"
|
||||||
|
|
||||||
|
|
|
@ -18,6 +18,8 @@
|
||||||
#include <linux/cred.h>
|
#include <linux/cred.h>
|
||||||
#include <linux/key-type.h>
|
#include <linux/key-type.h>
|
||||||
#include <linux/digsig.h>
|
#include <linux/digsig.h>
|
||||||
|
#include <crypto/public_key.h>
|
||||||
|
#include <keys/system_keyring.h>
|
||||||
|
|
||||||
#include "integrity.h"
|
#include "integrity.h"
|
||||||
|
|
||||||
|
@ -40,6 +42,35 @@ static bool init_keyring __initdata = true;
|
||||||
static bool init_keyring __initdata;
|
static bool init_keyring __initdata;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef CONFIG_SYSTEM_TRUSTED_KEYRING
|
||||||
|
/*
|
||||||
|
* Restrict the addition of keys into the IMA keyring.
|
||||||
|
*
|
||||||
|
* Any key that needs to go in .ima keyring must be signed by CA in
|
||||||
|
* either .system or .ima_mok keyrings.
|
||||||
|
*/
|
||||||
|
static int restrict_link_by_ima_mok(struct key *keyring,
|
||||||
|
const struct key_type *type,
|
||||||
|
unsigned long flags,
|
||||||
|
const union key_payload *payload)
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
ret = restrict_link_by_builtin_trusted(keyring, type, flags, payload);
|
||||||
|
if (ret != -ENOKEY)
|
||||||
|
return ret;
|
||||||
|
|
||||||
|
return restrict_link_by_signature(get_ima_mok_keyring(),
|
||||||
|
type, payload);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
/*
|
||||||
|
* If there's no system trusted keyring, then keys cannot be loaded into
|
||||||
|
* .ima_mok and added keys cannot be marked trusted.
|
||||||
|
*/
|
||||||
|
#define restrict_link_by_ima_mok restrict_link_reject
|
||||||
|
#endif
|
||||||
|
|
||||||
int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,
|
int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,
|
||||||
const char *digest, int digestlen)
|
const char *digest, int digestlen)
|
||||||
{
|
{
|
||||||
|
@ -84,7 +115,7 @@ int __init integrity_init_keyring(const unsigned int id)
|
||||||
KEY_USR_VIEW | KEY_USR_READ |
|
KEY_USR_VIEW | KEY_USR_READ |
|
||||||
KEY_USR_WRITE | KEY_USR_SEARCH),
|
KEY_USR_WRITE | KEY_USR_SEARCH),
|
||||||
KEY_ALLOC_NOT_IN_QUOTA,
|
KEY_ALLOC_NOT_IN_QUOTA,
|
||||||
NULL, NULL);
|
restrict_link_by_ima_mok, NULL);
|
||||||
if (IS_ERR(keyring[id])) {
|
if (IS_ERR(keyring[id])) {
|
||||||
err = PTR_ERR(keyring[id]);
|
err = PTR_ERR(keyring[id]);
|
||||||
pr_info("Can't allocate %s keyring (%d)\n",
|
pr_info("Can't allocate %s keyring (%d)\n",
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
#include <linux/cred.h>
|
#include <linux/cred.h>
|
||||||
#include <linux/err.h>
|
#include <linux/err.h>
|
||||||
#include <linux/init.h>
|
#include <linux/init.h>
|
||||||
#include <keys/asymmetric-type.h>
|
#include <keys/system_keyring.h>
|
||||||
|
|
||||||
|
|
||||||
struct key *ima_mok_keyring;
|
struct key *ima_mok_keyring;
|
||||||
|
@ -36,7 +36,7 @@ __init int ima_mok_init(void)
|
||||||
KEY_USR_VIEW | KEY_USR_READ |
|
KEY_USR_VIEW | KEY_USR_READ |
|
||||||
KEY_USR_WRITE | KEY_USR_SEARCH,
|
KEY_USR_WRITE | KEY_USR_SEARCH,
|
||||||
KEY_ALLOC_NOT_IN_QUOTA,
|
KEY_ALLOC_NOT_IN_QUOTA,
|
||||||
keyring_restrict_trusted_only, NULL);
|
restrict_link_by_builtin_trusted, NULL);
|
||||||
|
|
||||||
ima_blacklist_keyring = keyring_alloc(".ima_blacklist",
|
ima_blacklist_keyring = keyring_alloc(".ima_blacklist",
|
||||||
KUIDT_INIT(0), KGIDT_INIT(0), current_cred(),
|
KUIDT_INIT(0), KGIDT_INIT(0), current_cred(),
|
||||||
|
@ -44,7 +44,7 @@ __init int ima_mok_init(void)
|
||||||
KEY_USR_VIEW | KEY_USR_READ |
|
KEY_USR_VIEW | KEY_USR_READ |
|
||||||
KEY_USR_WRITE | KEY_USR_SEARCH,
|
KEY_USR_WRITE | KEY_USR_SEARCH,
|
||||||
KEY_ALLOC_NOT_IN_QUOTA,
|
KEY_ALLOC_NOT_IN_QUOTA,
|
||||||
keyring_restrict_trusted_only, NULL);
|
restrict_link_by_builtin_trusted, NULL);
|
||||||
|
|
||||||
if (IS_ERR(ima_mok_keyring) || IS_ERR(ima_blacklist_keyring))
|
if (IS_ERR(ima_mok_keyring) || IS_ERR(ima_blacklist_keyring))
|
||||||
panic("Can't allocate IMA MOK or blacklist keyrings.");
|
panic("Can't allocate IMA MOK or blacklist keyrings.");
|
||||||
|
|
Loading…
Reference in New Issue