2022-08-11 12:30:46 +02:00
|
|
|
From 9888bf40d960339a59dc18fb6e1df5f65b4668e3 Mon Sep 17 00:00:00 2001
|
|
|
|
From: Hernan Gatta <hegatta@linux.microsoft.com>
|
|
|
|
Date: Tue, 1 Feb 2022 05:02:56 -0800
|
|
|
|
Subject: [PATCH 13/14] cryptodisk: Support key protectors
|
|
|
|
|
|
|
|
Add a new parameter to cryptomount to support the key protectors framework: -k.
|
|
|
|
The parameter is used to automatically retrieve a key from specified key
|
|
|
|
protectors. The parameter may be repeated to specify any number of key
|
|
|
|
protectors. These are tried in order until one provides a usable key for any
|
|
|
|
given disk.
|
|
|
|
|
|
|
|
Signed-off-by: <Hernan Gatta hegatta@linux.microsoft.com>
|
|
|
|
---
|
|
|
|
Makefile.util.def | 1 +
|
|
|
|
grub-core/disk/cryptodisk.c | 166 +++++++++++++++++++++++++++++-------
|
|
|
|
include/grub/cryptodisk.h | 14 +++
|
|
|
|
3 files changed, 151 insertions(+), 30 deletions(-)
|
|
|
|
|
|
|
|
--- a/Makefile.util.def
|
|
|
|
+++ b/Makefile.util.def
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -35,6 +35,7 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
common = grub-core/kern/list.c;
|
|
|
|
common = grub-core/kern/misc.c;
|
|
|
|
common = grub-core/kern/partition.c;
|
|
|
|
+ common = grub-core/kern/protectors.c;
|
|
|
|
common = grub-core/lib/crypto.c;
|
|
|
|
common = grub-core/lib/json/json.c;
|
|
|
|
common = grub-core/disk/luks.c;
|
|
|
|
--- a/grub-core/disk/cryptodisk.c
|
|
|
|
+++ b/grub-core/disk/cryptodisk.c
|
|
|
|
@@ -26,6 +26,7 @@
|
|
|
|
#include <grub/file.h>
|
|
|
|
#include <grub/procfs.h>
|
|
|
|
#include <grub/partition.h>
|
|
|
|
+#include <grub/protector.h>
|
|
|
|
|
|
|
|
#ifdef GRUB_UTIL
|
|
|
|
#include <grub/emu/hostdisk.h>
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -44,7 +45,8 @@
|
|
|
|
OPTION_KEYFILE,
|
|
|
|
OPTION_KEYFILE_OFFSET,
|
|
|
|
OPTION_KEYFILE_SIZE,
|
|
|
|
- OPTION_HEADER
|
|
|
|
+ OPTION_HEADER,
|
|
|
|
+ OPTION_PROTECTOR
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct grub_arg_option options[] =
|
|
|
|
@@ -58,6 +60,8 @@
|
|
|
|
{"keyfile-offset", 'O', 0, N_("Key file offset (bytes)"), 0, ARG_TYPE_INT},
|
|
|
|
{"keyfile-size", 'S', 0, N_("Key file data size (bytes)"), 0, ARG_TYPE_INT},
|
|
|
|
{"header", 'H', 0, N_("Read header from file"), 0, ARG_TYPE_STRING},
|
|
|
|
+ {"protector", 'P', GRUB_ARG_OPTION_REPEATABLE,
|
2022-08-11 12:30:46 +02:00
|
|
|
+ N_("Unlock volume(s) using key protector(s)."), 0, ARG_TYPE_STRING},
|
|
|
|
{0, 0, 0, 0, 0, 0}
|
|
|
|
};
|
|
|
|
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1061,6 +1065,7 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
grub_err_t ret = GRUB_ERR_NONE;
|
|
|
|
grub_cryptodisk_t dev;
|
2023-08-24 05:25:56 +02:00
|
|
|
grub_cryptodisk_dev_t cr;
|
2022-08-11 12:30:46 +02:00
|
|
|
+ int i;
|
2023-08-24 05:25:56 +02:00
|
|
|
struct cryptodisk_read_hook_ctx read_hook_data = {0};
|
2022-08-11 12:30:46 +02:00
|
|
|
int askpass = 0;
|
|
|
|
char *part = NULL;
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1113,41 +1118,112 @@
|
|
|
|
goto error_no_close;
|
2022-08-11 12:30:46 +02:00
|
|
|
if (!dev)
|
|
|
|
continue;
|
2023-08-24 05:25:56 +02:00
|
|
|
+ break;
|
2022-08-11 12:30:46 +02:00
|
|
|
+ }
|
|
|
|
|
|
|
|
- if (!cargs->key_len)
|
|
|
|
- {
|
|
|
|
- /* Get the passphrase from the user, if no key data. */
|
|
|
|
- askpass = 1;
|
|
|
|
- part = grub_partition_get_name (source->partition);
|
|
|
|
- grub_printf_ (N_("Enter passphrase for %s%s%s (%s): "), source->name,
|
|
|
|
- source->partition != NULL ? "," : "",
|
|
|
|
- part != NULL ? part : N_("UNKNOWN"),
|
|
|
|
- dev->uuid);
|
|
|
|
- grub_free (part);
|
|
|
|
-
|
|
|
|
- cargs->key_data = grub_malloc (GRUB_CRYPTODISK_MAX_PASSPHRASE);
|
|
|
|
- if (cargs->key_data == NULL)
|
2023-08-24 05:25:56 +02:00
|
|
|
- goto error_no_close;
|
|
|
|
+ if (dev == NULL)
|
|
|
|
+ {
|
|
|
|
+ grub_error (GRUB_ERR_BAD_MODULE,
|
|
|
|
+ "no cryptodisk module can handle this device");
|
|
|
|
+ goto error_no_close;
|
|
|
|
+ }
|
|
|
|
|
2022-08-11 12:30:46 +02:00
|
|
|
- if (!grub_password_get ((char *) cargs->key_data, GRUB_CRYPTODISK_MAX_PASSPHRASE))
|
|
|
|
- {
|
|
|
|
- grub_error (GRUB_ERR_BAD_ARGUMENT, "passphrase not supplied");
|
|
|
|
- goto error;
|
|
|
|
- }
|
|
|
|
- cargs->key_len = grub_strlen ((char *) cargs->key_data);
|
|
|
|
- }
|
2023-08-24 05:25:56 +02:00
|
|
|
+ if (cargs->protectors)
|
2022-08-11 12:30:46 +02:00
|
|
|
+ {
|
2023-08-24 05:25:56 +02:00
|
|
|
+ for (i = 0; cargs->protectors[i]; i++)
|
|
|
|
+ {
|
|
|
|
+ if (cargs->key_cache[i].invalid)
|
|
|
|
+ continue;
|
2022-08-11 12:30:46 +02:00
|
|
|
|
|
|
|
- ret = cr->recover_key (source, dev, cargs);
|
|
|
|
- if (ret != GRUB_ERR_NONE)
|
2023-08-24 05:25:56 +02:00
|
|
|
- goto error;
|
|
|
|
+ if (cargs->key_cache[i].key == NULL)
|
|
|
|
+ {
|
|
|
|
+ ret = grub_key_protector_recover_key (cargs->protectors[i],
|
|
|
|
+ &cargs->key_cache[i].key,
|
|
|
|
+ &cargs->key_cache[i].key_len);
|
|
|
|
+ if (ret != GRUB_ERR_NONE)
|
|
|
|
+ {
|
|
|
|
+ if (grub_errno)
|
|
|
|
+ {
|
|
|
|
+ grub_print_error ();
|
|
|
|
+ grub_errno = GRUB_ERR_NONE;
|
|
|
|
+ }
|
2022-08-11 12:30:46 +02:00
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ grub_dprintf ("cryptodisk",
|
|
|
|
+ "failed to recover a key from key protector "
|
|
|
|
+ "%s, will not try it again for any other "
|
|
|
|
+ "disks, if any, during this invocation of "
|
|
|
|
+ "cryptomount\n",
|
|
|
|
+ cargs->protectors[i]);
|
2022-08-11 12:30:46 +02:00
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ cargs->key_cache[i].invalid = 1;
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ }
|
2022-08-11 12:30:46 +02:00
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ cargs->key_data = cargs->key_cache[i].key;
|
|
|
|
+ cargs->key_len = cargs->key_cache[i].key_len;
|
2022-08-11 12:30:46 +02:00
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ ret = cr->recover_key (source, dev, cargs);
|
|
|
|
+ if (ret != GRUB_ERR_NONE)
|
|
|
|
+ {
|
|
|
|
+ part = grub_partition_get_name (source->partition);
|
|
|
|
+ grub_dprintf ("cryptodisk",
|
|
|
|
+ "recovered a key from key protector %s but it "
|
|
|
|
+ "failed to unlock %s%s%s (%s)\n",
|
|
|
|
+ cargs->protectors[i], source->name,
|
|
|
|
+ source->partition != NULL ? "," : "",
|
|
|
|
+ part != NULL ? part : N_("UNKNOWN"), dev->uuid);
|
|
|
|
+ grub_free (part);
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ ret = grub_cryptodisk_insert (dev, name, source);
|
|
|
|
+ if (ret != GRUB_ERR_NONE)
|
|
|
|
+ goto error;
|
|
|
|
+ goto cleanup;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
|
|
|
|
- ret = grub_cryptodisk_insert (dev, name, source);
|
|
|
|
- if (ret != GRUB_ERR_NONE)
|
2022-08-11 12:30:46 +02:00
|
|
|
+ part = grub_partition_get_name (source->partition);
|
|
|
|
+ grub_error (GRUB_ERR_ACCESS_DENIED,
|
2023-08-24 05:25:56 +02:00
|
|
|
+ N_("no key protector provided a usable key for %s%s%s (%s)"),
|
|
|
|
+ source->name, source->partition != NULL ? "," : "",
|
|
|
|
+ part != NULL ? part : N_("UNKNOWN"), dev->uuid);
|
2022-08-11 12:30:46 +02:00
|
|
|
+ grub_free (part);
|
|
|
|
goto error;
|
|
|
|
+ }
|
2023-08-24 05:25:56 +02:00
|
|
|
+
|
2022-08-11 12:30:46 +02:00
|
|
|
+ if (!cargs->key_len)
|
|
|
|
+ {
|
|
|
|
+ /* Get the passphrase from the user, if no key data. */
|
|
|
|
+ askpass = 1;
|
|
|
|
+ part = grub_partition_get_name (source->partition);
|
|
|
|
+ grub_printf_ (N_("Enter passphrase for %s%s%s (%s): "), source->name,
|
2023-08-24 05:25:56 +02:00
|
|
|
+ source->partition != NULL ? "," : "",
|
|
|
|
+ part != NULL ? part : N_("UNKNOWN"), dev->uuid);
|
2022-08-11 12:30:46 +02:00
|
|
|
+ grub_free (part);
|
|
|
|
+
|
|
|
|
+ cargs->key_data = grub_malloc (GRUB_CRYPTODISK_MAX_PASSPHRASE);
|
|
|
|
+ if (cargs->key_data == NULL)
|
2023-08-24 05:25:56 +02:00
|
|
|
+ goto error;
|
2022-08-11 12:30:46 +02:00
|
|
|
+
|
|
|
|
+ if (!grub_password_get ((char *) cargs->key_data, GRUB_CRYPTODISK_MAX_PASSPHRASE))
|
2023-08-24 05:25:56 +02:00
|
|
|
+ {
|
|
|
|
+ grub_error (GRUB_ERR_BAD_ARGUMENT, "passphrase not supplied");
|
|
|
|
+ goto error;
|
|
|
|
+ }
|
2022-08-11 12:30:46 +02:00
|
|
|
+ cargs->key_len = grub_strlen ((char *) cargs->key_data);
|
|
|
|
+ }
|
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ ret = cr->recover_key (source, dev, cargs);
|
2022-08-11 12:30:46 +02:00
|
|
|
+ if (ret != GRUB_ERR_NONE)
|
|
|
|
+ goto error;
|
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ ret = grub_cryptodisk_insert (dev, name, source);
|
|
|
|
+ if (ret != GRUB_ERR_NONE)
|
|
|
|
+ goto error;
|
2022-08-11 12:30:46 +02:00
|
|
|
|
|
|
|
- goto cleanup;
|
|
|
|
- }
|
|
|
|
- grub_error (GRUB_ERR_BAD_MODULE, "no cryptodisk module can handle this device");
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
error:
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1258,6 +1334,20 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
+static void
|
|
|
|
+grub_cryptodisk_clear_key_cache (struct grub_cryptomount_args *cargs)
|
|
|
|
+{
|
|
|
|
+ int i;
|
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ if (cargs->key_cache == NULL || cargs->protectors == NULL)
|
2022-08-11 12:30:46 +02:00
|
|
|
+ return;
|
|
|
|
+
|
|
|
|
+ for (i = 0; cargs->protectors[i]; i++)
|
|
|
|
+ grub_free (cargs->key_cache[i].key);
|
|
|
|
+
|
|
|
|
+ grub_free (cargs->key_cache);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
static grub_err_t
|
|
|
|
grub_cmd_cryptomount (grub_extcmd_context_t ctxt, int argc, char **args)
|
|
|
|
{
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1270,6 +1360,10 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
if (grub_cryptodisk_list == NULL)
|
|
|
|
return grub_error (GRUB_ERR_BAD_MODULE, "no cryptodisk modules loaded");
|
|
|
|
|
2023-08-24 05:25:56 +02:00
|
|
|
+ if (state[OPTION_PASSWORD].set && state[OPTION_PROTECTOR].set) /* password and key protector */
|
2022-08-11 12:30:46 +02:00
|
|
|
+ return grub_error (GRUB_ERR_BAD_ARGUMENT,
|
2023-08-24 05:25:56 +02:00
|
|
|
+ "a password and a key protector cannot both be set");
|
2022-08-11 12:30:46 +02:00
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
if (state[OPTION_PASSWORD].set) /* password */
|
2022-08-11 12:30:46 +02:00
|
|
|
{
|
2023-08-24 05:25:56 +02:00
|
|
|
cargs.key_data = (grub_uint8_t *) state[OPTION_PASSWORD].arg;
|
|
|
|
@@ -1362,6 +1456,15 @@
|
|
|
|
return grub_errno;
|
2022-08-11 12:30:46 +02:00
|
|
|
}
|
|
|
|
|
2023-08-24 05:25:56 +02:00
|
|
|
+ if (state[OPTION_PROTECTOR].set) /* key protector(s) */
|
2022-08-11 12:30:46 +02:00
|
|
|
+ {
|
2023-08-24 05:25:56 +02:00
|
|
|
+ cargs.key_cache = grub_zalloc (state[OPTION_PROTECTOR].set * sizeof (*cargs.key_cache));
|
|
|
|
+ if (cargs.key_cache == NULL)
|
|
|
|
+ return grub_error (GRUB_ERR_OUT_OF_MEMORY,
|
|
|
|
+ "no memory for key protector key cache");
|
|
|
|
+ cargs.protectors = state[OPTION_PROTECTOR].args;
|
2022-08-11 12:30:46 +02:00
|
|
|
+ }
|
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
if (state[OPTION_UUID].set) /* uuid */
|
2022-08-11 12:30:46 +02:00
|
|
|
{
|
|
|
|
int found_uuid;
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1370,6 +1473,7 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
dev = grub_cryptodisk_get_by_uuid (args[0]);
|
|
|
|
if (dev)
|
|
|
|
{
|
2023-08-24 05:25:56 +02:00
|
|
|
+ grub_cryptodisk_clear_key_cache (&cargs);
|
2022-08-11 12:30:46 +02:00
|
|
|
grub_dprintf ("cryptodisk",
|
|
|
|
"already mounted as crypto%lu\n", dev->id);
|
|
|
|
return GRUB_ERR_NONE;
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1378,6 +1482,7 @@
|
|
|
|
cargs.check_boot = state[OPTION_BOOT].set;
|
2022-08-11 12:30:46 +02:00
|
|
|
cargs.search_uuid = args[0];
|
|
|
|
found_uuid = grub_device_iterate (&grub_cryptodisk_scan_device, &cargs);
|
|
|
|
+ grub_cryptodisk_clear_key_cache (&cargs);
|
|
|
|
|
|
|
|
if (found_uuid)
|
|
|
|
return GRUB_ERR_NONE;
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1397,6 +1502,7 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
{
|
2023-08-24 05:25:56 +02:00
|
|
|
cargs.check_boot = state[OPTION_BOOT].set;
|
2022-08-11 12:30:46 +02:00
|
|
|
grub_device_iterate (&grub_cryptodisk_scan_device, &cargs);
|
|
|
|
+ grub_cryptodisk_clear_key_cache (&cargs);
|
|
|
|
return GRUB_ERR_NONE;
|
|
|
|
}
|
|
|
|
else
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1420,6 +1526,7 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
disk = grub_disk_open (diskname);
|
|
|
|
if (!disk)
|
|
|
|
{
|
2023-08-24 05:25:56 +02:00
|
|
|
+ grub_cryptodisk_clear_key_cache (&cargs);
|
2022-08-11 12:30:46 +02:00
|
|
|
if (disklast)
|
|
|
|
*disklast = ')';
|
|
|
|
return grub_errno;
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1430,12 +1537,14 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
{
|
|
|
|
grub_dprintf ("cryptodisk", "already mounted as crypto%lu\n", dev->id);
|
|
|
|
grub_disk_close (disk);
|
2023-08-24 05:25:56 +02:00
|
|
|
+ grub_cryptodisk_clear_key_cache (&cargs);
|
2022-08-11 12:30:46 +02:00
|
|
|
if (disklast)
|
|
|
|
*disklast = ')';
|
|
|
|
return GRUB_ERR_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
dev = grub_cryptodisk_scan_device_real (diskname, disk, &cargs);
|
|
|
|
+ grub_cryptodisk_clear_key_cache (&cargs);
|
|
|
|
|
|
|
|
grub_disk_close (disk);
|
|
|
|
if (disklast)
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -1576,6 +1685,7 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
cmd = grub_register_extcmd ("cryptomount", grub_cmd_cryptomount, 0,
|
2023-08-24 05:25:56 +02:00
|
|
|
N_("[ [-p password] | [-k keyfile"
|
|
|
|
" [-O keyoffset] [-S keysize] ] ] [-H file]"
|
|
|
|
+ " [-P protector [-P protector ...]]"
|
|
|
|
" <SOURCE|-u UUID|-a|-b>"),
|
2022-08-11 12:30:46 +02:00
|
|
|
N_("Mount a crypto device."), options);
|
|
|
|
grub_procfs_register ("luks_script", &luks_script);
|
|
|
|
--- a/include/grub/cryptodisk.h
|
|
|
|
+++ b/include/grub/cryptodisk.h
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -70,6 +70,18 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
(*grub_cryptodisk_rekey_func_t) (struct grub_cryptodisk *dev,
|
|
|
|
grub_uint64_t zoneno);
|
|
|
|
|
|
|
|
+struct grub_cryptomount_cached_key
|
|
|
|
+{
|
|
|
|
+ grub_uint8_t *key;
|
|
|
|
+ grub_size_t key_len;
|
|
|
|
+
|
2023-08-24 05:25:56 +02:00
|
|
|
+ /*
|
|
|
|
+ * The key protector associated with this cache entry failed, so avoid it
|
|
|
|
+ * even if the cached entry (an instance of this structure) is empty.
|
|
|
|
+ */
|
2022-08-11 12:30:46 +02:00
|
|
|
+ int invalid;
|
|
|
|
+};
|
|
|
|
+
|
|
|
|
struct grub_cryptomount_args
|
|
|
|
{
|
|
|
|
/* scan: Flag to indicate that only bootable volumes should be decrypted */
|
2023-08-24 05:25:56 +02:00
|
|
|
@@ -81,6 +93,10 @@
|
2022-08-11 12:30:46 +02:00
|
|
|
/* recover_key: Length of key_data */
|
|
|
|
grub_size_t key_len;
|
2023-08-24 05:25:56 +02:00
|
|
|
grub_file_t hdr_file;
|
2022-08-11 12:30:46 +02:00
|
|
|
+ /* recover_key: Names of the key protectors to use (NULL-terminated) */
|
|
|
|
+ char **protectors;
|
|
|
|
+ /* recover_key: Key cache to avoid invoking the same key protector twice */
|
|
|
|
+ struct grub_cryptomount_cached_key *key_cache;
|
|
|
|
};
|
|
|
|
typedef struct grub_cryptomount_args *grub_cryptomount_args_t;
|
|
|
|
|