2024-08-23 18:23:36 +02:00
|
|
|
From 91a99dffbe78b91a0c18b32ebecf755ba9d74032 Mon Sep 17 00:00:00 2001
|
2024-05-03 13:19:28 +02:00
|
|
|
From: Gary Lin <glin@suse.com>
|
|
|
|
Date: Thu, 10 Aug 2023 10:19:29 +0800
|
|
|
|
Subject: [PATCH 4/4] diskfilter: look up cryptodisk devices first
|
|
|
|
|
|
|
|
When using disk auto-unlocking with TPM 2.0, the typical grub.cfg may
|
|
|
|
look like this:
|
|
|
|
|
|
|
|
tpm2_key_protector_init --tpm2key=(hd0,gpt1)/boot/grub2/sealed.tpm
|
|
|
|
cryptomount -u <PART-UUID> -P tpm2
|
|
|
|
search --fs-uuid --set=root <FS-UUID>
|
|
|
|
|
|
|
|
Since the disk search order is based on the order of module loading, the
|
|
|
|
attacker could insert a malicious disk with the same FS-UUID root to
|
2024-08-23 18:23:36 +02:00
|
|
|
trick grub2 to boot into the malicious root and further dump memory to
|
2024-05-03 13:19:28 +02:00
|
|
|
steal the unsealed key.
|
|
|
|
|
2024-08-23 18:23:36 +02:00
|
|
|
Do defend against such an attack, we can specify the hint provided by
|
|
|
|
'grub-probe' to search the encrypted partition first:
|
2024-05-03 13:19:28 +02:00
|
|
|
|
|
|
|
search --fs-uuid --set=root --hint='cryptouuid/<PART-UUID>' <FS-UUID>
|
|
|
|
|
2024-08-23 18:23:36 +02:00
|
|
|
However, for LVM on an encrypted partition, the search hint provided by
|
2024-05-03 13:19:28 +02:00
|
|
|
'grub-probe' is:
|
|
|
|
|
|
|
|
--hint='lvmid/<VG-UUID>/<LV-UUID>'
|
|
|
|
|
|
|
|
It doesn't guarantee to look up the logical volume from the encrypted
|
|
|
|
partition, so the attacker may have the chance to fool grub2 to boot
|
|
|
|
into the malicious disk.
|
|
|
|
|
2024-08-23 18:23:36 +02:00
|
|
|
To minimize the attack surface, this commit tweaks the disk device search
|
2024-05-03 13:19:28 +02:00
|
|
|
in diskfilter to look up cryptodisk devices first and then others, so
|
|
|
|
that the auto-unlocked disk will be found first, not the attacker's disk.
|
|
|
|
|
2024-08-23 18:23:36 +02:00
|
|
|
Cc: Fabian Vogt <fvogt@suse.com>
|
2024-05-03 13:19:28 +02:00
|
|
|
Signed-off-by: Gary Lin <glin@suse.com>
|
2024-08-23 18:23:36 +02:00
|
|
|
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
|
2024-05-03 13:19:28 +02:00
|
|
|
---
|
|
|
|
grub-core/disk/diskfilter.c | 35 ++++++++++++++++++++++++++---------
|
|
|
|
1 file changed, 26 insertions(+), 9 deletions(-)
|
|
|
|
|
|
|
|
diff --git a/grub-core/disk/diskfilter.c b/grub-core/disk/diskfilter.c
|
2024-08-23 18:23:36 +02:00
|
|
|
index 41e177549..c45bef1ca 100644
|
2024-05-03 13:19:28 +02:00
|
|
|
--- a/grub-core/disk/diskfilter.c
|
|
|
|
+++ b/grub-core/disk/diskfilter.c
|
2024-08-23 18:23:36 +02:00
|
|
|
@@ -322,15 +322,32 @@ scan_devices (const char *arname)
|
2024-05-03 13:19:28 +02:00
|
|
|
int need_rescan;
|
|
|
|
|
|
|
|
for (pull = 0; pull < GRUB_DISK_PULL_MAX; pull++)
|
|
|
|
- for (p = grub_disk_dev_list; p; p = p->next)
|
|
|
|
- if (p->id != GRUB_DISK_DEVICE_DISKFILTER_ID
|
|
|
|
- && p->disk_iterate)
|
|
|
|
- {
|
|
|
|
- if ((p->disk_iterate) (scan_disk_hook, NULL, pull))
|
|
|
|
- return;
|
|
|
|
- if (arname && is_lv_readable (find_lv (arname), 1))
|
|
|
|
- return;
|
|
|
|
- }
|
|
|
|
+ {
|
|
|
|
+ /* look up the crytodisk devices first */
|
|
|
|
+ for (p = grub_disk_dev_list; p; p = p->next)
|
|
|
|
+ if (p->id == GRUB_DISK_DEVICE_CRYPTODISK_ID
|
|
|
|
+ && p->disk_iterate)
|
|
|
|
+ {
|
|
|
|
+ if ((p->disk_iterate) (scan_disk_hook, NULL, pull))
|
|
|
|
+ return;
|
|
|
|
+ if (arname && is_lv_readable (find_lv (arname), 1))
|
|
|
|
+ return;
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /* check the devices other than crytodisk */
|
|
|
|
+ for (p = grub_disk_dev_list; p; p = p->next)
|
|
|
|
+ if (p->id == GRUB_DISK_DEVICE_CRYPTODISK_ID)
|
|
|
|
+ continue;
|
|
|
|
+ else if (p->id != GRUB_DISK_DEVICE_DISKFILTER_ID
|
|
|
|
+ && p->disk_iterate)
|
|
|
|
+ {
|
|
|
|
+ if ((p->disk_iterate) (scan_disk_hook, NULL, pull))
|
|
|
|
+ return;
|
|
|
|
+ if (arname && is_lv_readable (find_lv (arname), 1))
|
|
|
|
+ return;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
|
|
|
|
scan_depth = 0;
|
|
|
|
need_rescan = 1;
|
|
|
|
--
|
|
|
|
2.35.3
|
|
|
|
|