2012-09-26 17:09:40 +08:00
|
|
|
/* Module signature checker
|
|
|
|
*
|
|
|
|
* Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
|
|
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public Licence
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the Licence, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
2015-10-21 21:04:48 +08:00
|
|
|
#include <linux/errno.h>
|
2016-03-01 18:36:07 +08:00
|
|
|
#include <linux/string.h>
|
KEYS: Move the point of trust determination to __key_link()
Move the point at which a key is determined to be trustworthy to
__key_link() so that we use the contents of the keyring being linked in to
to determine whether the key being linked in is trusted or not.
What is 'trusted' then becomes a matter of what's in the keyring.
Currently, the test is done when the key is parsed, but given that at that
point we can only sensibly refer to the contents of the system trusted
keyring, we can only use that as the basis for working out the
trustworthiness of a new key.
With this change, a trusted keyring is a set of keys that once the
trusted-only flag is set cannot be added to except by verification through
one of the contained keys.
Further, adding a key into a trusted keyring, whilst it might grant
trustworthiness in the context of that keyring, does not automatically
grant trustworthiness in the context of a second keyring to which it could
be secondarily linked.
To accomplish this, the authentication data associated with the key source
must now be retained. For an X.509 cert, this means the contents of the
AuthorityKeyIdentifier and the signature data.
If system keyrings are disabled then restrict_link_by_builtin_trusted()
resolves to restrict_link_reject(). The integrity digital signature code
still works correctly with this as it was previously using
KEY_FLAG_TRUSTED_ONLY, which doesn't permit anything to be added if there
is no system keyring against which trust can be determined.
Signed-off-by: David Howells <dhowells@redhat.com>
2016-04-06 23:14:26 +08:00
|
|
|
#include <linux/verification.h>
|
2015-07-21 04:16:27 +08:00
|
|
|
#include <crypto/public_key.h>
|
2012-09-26 17:09:40 +08:00
|
|
|
#include "module-internal.h"
|
|
|
|
|
2016-03-04 05:49:27 +08:00
|
|
|
enum pkey_id_type {
|
|
|
|
PKEY_ID_PGP, /* OpenPGP generated key ID */
|
|
|
|
PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
|
|
|
|
PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
|
|
|
|
};
|
|
|
|
|
2012-09-26 17:11:03 +08:00
|
|
|
/*
|
|
|
|
* Module signature information block.
|
|
|
|
*
|
|
|
|
* The constituents of the signature section are, in order:
|
|
|
|
*
|
|
|
|
* - Signer's name
|
|
|
|
* - Key identifier
|
|
|
|
* - Signature data
|
|
|
|
* - Information block
|
|
|
|
*/
|
|
|
|
struct module_signature {
|
2015-07-21 04:16:27 +08:00
|
|
|
u8 algo; /* Public-key crypto algorithm [0] */
|
|
|
|
u8 hash; /* Digest algorithm [0] */
|
|
|
|
u8 id_type; /* Key identifier type [PKEY_ID_PKCS7] */
|
|
|
|
u8 signer_len; /* Length of signer's name [0] */
|
|
|
|
u8 key_id_len; /* Length of key identifier [0] */
|
2012-10-22 22:05:48 +08:00
|
|
|
u8 __pad[3];
|
|
|
|
__be32 sig_len; /* Length of signature data */
|
2012-09-26 17:11:03 +08:00
|
|
|
};
|
|
|
|
|
2012-09-26 17:09:40 +08:00
|
|
|
/*
|
|
|
|
* Verify the signature on a module.
|
|
|
|
*/
|
2018-06-29 22:37:08 +08:00
|
|
|
int mod_verify_sig(const void *mod, struct load_info *info)
|
2012-09-26 17:09:40 +08:00
|
|
|
{
|
2012-09-26 17:11:03 +08:00
|
|
|
struct module_signature ms;
|
2018-06-29 22:37:08 +08:00
|
|
|
size_t sig_len, modlen = info->len;
|
2012-09-26 17:11:03 +08:00
|
|
|
|
2012-10-21 09:59:31 +08:00
|
|
|
pr_devel("==>%s(,%zu)\n", __func__, modlen);
|
2012-09-26 17:11:03 +08:00
|
|
|
|
2012-10-20 08:19:29 +08:00
|
|
|
if (modlen <= sizeof(ms))
|
2012-09-26 17:11:03 +08:00
|
|
|
return -EBADMSG;
|
|
|
|
|
2012-10-20 08:19:29 +08:00
|
|
|
memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms));
|
|
|
|
modlen -= sizeof(ms);
|
2012-09-26 17:11:03 +08:00
|
|
|
|
|
|
|
sig_len = be32_to_cpu(ms.sig_len);
|
2012-10-20 08:19:29 +08:00
|
|
|
if (sig_len >= modlen)
|
2012-09-26 17:11:03 +08:00
|
|
|
return -EBADMSG;
|
2012-10-20 08:19:29 +08:00
|
|
|
modlen -= sig_len;
|
2018-06-29 22:37:08 +08:00
|
|
|
info->len = modlen;
|
2012-09-26 17:11:03 +08:00
|
|
|
|
2015-07-21 04:16:27 +08:00
|
|
|
if (ms.id_type != PKEY_ID_PKCS7) {
|
2018-06-29 22:37:08 +08:00
|
|
|
pr_err("%s: Module is not signed with expected PKCS#7 message\n",
|
|
|
|
info->name);
|
2012-09-26 17:11:03 +08:00
|
|
|
return -ENOPKG;
|
|
|
|
}
|
|
|
|
|
2015-07-21 04:16:27 +08:00
|
|
|
if (ms.algo != 0 ||
|
|
|
|
ms.hash != 0 ||
|
|
|
|
ms.signer_len != 0 ||
|
|
|
|
ms.key_id_len != 0 ||
|
|
|
|
ms.__pad[0] != 0 ||
|
|
|
|
ms.__pad[1] != 0 ||
|
|
|
|
ms.__pad[2] != 0) {
|
2018-06-29 22:37:08 +08:00
|
|
|
pr_err("%s: PKCS#7 signature info has unexpected non-zero params\n",
|
|
|
|
info->name);
|
2015-07-21 04:16:27 +08:00
|
|
|
return -EBADMSG;
|
|
|
|
}
|
2012-09-26 17:11:03 +08:00
|
|
|
|
2016-04-06 23:14:24 +08:00
|
|
|
return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len,
|
2016-04-06 23:14:24 +08:00
|
|
|
NULL, VERIFYING_MODULE_SIGNATURE,
|
2016-04-06 23:14:24 +08:00
|
|
|
NULL, NULL);
|
2012-09-26 17:09:40 +08:00
|
|
|
}
|