[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 2/2] vtpmmgr: execute deep quote in locality 0



On 04/05/2015 07:09 AM, Emil Condrea wrote:
Enables deep quote execution for vtpmmgr which can not be started
using locality 2. The VTPM_ORD_GET_QUOTE command is backwards
compatible. When receives flags=0 from vTPM it extends additional
information into the PCRs as it did before.

Even without extending values into the resettable PCRs, the PCR
selection for the quote should not be ignored: otherwise, the
measurement of the hypervisor (stored in either PCR 4-5 or PCR 18-19)
cannot be included in a deep quote.  Allowing a guest to attest to the
measurement of its hypervisor is one of the major reasons for allowing a
deep quote and is likely to be mandatory in a vTPM provisioning quote.

The backwards compatibility added here has some caveats that need to be
treated carefully.  In the current version, it is not possible to
distinguish between a request that has the new externData structure and
a request that uses flags=0 where the vTPM itself has constructed a
requestData value that looks like a valid externData.

The simplest solution is to always use the structure prepared by the
vTPM manager for externData and remove backwards compatibility from the
series.  Since the new quote format would be introduced with a new
version of the vTPM Manager and (likely) a new hypervisor, any support
software that makes use of the quotes can be updated at the same time.

If backwards compatibility is needed, then there must be a way to
distinguish a new-format quote from an old-format quote.  If the reset
of the modified PCRs is moved to the end of the quote operation (instead
of the beginning, as is currently done), the value of PCR 20 will be
at its reset value (either 00..00 or ff..ff) when the new-format quote
is requested.  Including the value of PCR 20 in all new-format quotes
would then be sufficient evidence that the externData value in the quote
was generated by the vTPM Manager.

In addition, it would be useful to add a command-line switch to the vTPM
manager that disables this backwards compatibility mode if a given
system will not be using it: this would avoid issues if the users of
that system have not read this discussion and decide to use quotes that
do not include PCR 20-23 (which is normally a sensible thing to do).

Flags are interpreted as a bitmask of:
  * VTPM_QUOTE_FLAGS_HASH_UUID
  * VTPM_QUOTE_FLAGS_VTPM_MEASUREMENTS
  * VTPM_QUOTE_FLAGS_GROUP_INFO
When using flags!=0, vtpmmgr ignores quoteSelect and TPM_Quote is
executed with:
   externData = SHA1(
    flags,
    requestData,
    [UUIDs if requested],
    [vTPM measurements if requested],
    [vTPM group update policy if requested]
   )

This specification does not match what you actually do below.  There are
some advantages to doing it the way you have coded, but the method for
calculating the hash needs to be fully documented.

Signed-off-by: Emil Condrea <emilcondrea@xxxxxxxxx>
---
[...]
diff --git a/stubdom/vtpmmgr/mgmt_authority.c b/stubdom/vtpmmgr/mgmt_authority.c
index 0526a12..0e4aac7 100644
--- a/stubdom/vtpmmgr/mgmt_authority.c
+++ b/stubdom/vtpmmgr/mgmt_authority.c
@@ -128,6 +128,49 @@ static int do_load_aik(struct mem_group *group, TPM_HANDLE 
*handle)
        return TPM_LoadKey(TPM_SRK_KEYHANDLE, &key, handle, 
(void*)&vtpm_globals.srk_auth, &vtpm_globals.oiap);
  }

+static void do_vtpminfo_hash(uint32_t extra_info_flags,struct mem_group *group,
+       const void* uuid, const uint8_t* kern_hash,unsigned char** calc_hashes)
+{
+       int i;
+       sha1_context ctx;
+       if(extra_info_flags & VTPM_QUOTE_FLAGS_HASH_UUID){
+               printk("hashing for FLAGS_HASH_UUID: ");
+               if(uuid){
+                       printk("true");
+                       sha1_starts(&ctx);
+                       sha1_update(&ctx, (void*)uuid, 16);
+                       sha1_finish(&ctx, *calc_hashes);
+                       *calc_hashes = *calc_hashes + 20;
+               }
+               printk("\n");
+       }
+       if(extra_info_flags & VTPM_QUOTE_FLAGS_VTPM_MEASUREMENTS){
+               printk("hashing for VTPM_QUOTE_FLAGS_VTPM_MEASUREMENTS: ");
+               if(kern_hash){
+                       printk("true");
+                       sha1_starts(&ctx);
+                       sha1_update(&ctx, (void*)kern_hash, 20);
+                       sha1_finish(&ctx, *calc_hashes);
+                       *calc_hashes = *calc_hashes + 20;
+               }
+               printk("\n");
+       }

If exactly one of (uuid) and (kern_hash) is NULL and both were requested
in extra_info_flags, it is not easy to determine which one was used.  A
better method would be to only place the sha1_update calls inside the
NULL check and always calculating the SHA1.  This makes interpreting the
result easier: for a given value of extra_info_flags, the size of the
externData structure is of constant size.  The presence of the SHA1 of
the empty string is a sentinel value indicating that the information is
not available.

+       if(extra_info_flags & VTPM_QUOTE_FLAGS_GROUP_INFO){
+               printk("hashing for VTPM_QUOTE_FLAGS_GROUP_INFO: true");
+               sha1_starts(&ctx);
+               sha1_update(&ctx, (void*)&group->id_data.saa_pubkey, 
sizeof(group->id_data.saa_pubkey));
+               sha1_update(&ctx, (void*)&group->details.cfg_seq, 8);
+               sha1_update(&ctx, (void*)&group->seal_bits.nr_cfgs, 4);
+               for(i=0; i < group->nr_seals; i++)
+                       sha1_update(&ctx, 
(void*)&group->seals[i].digest_release, 20);
+               sha1_update(&ctx, (void*)&group->seal_bits.nr_kerns, 4);
+               sha1_update(&ctx, (void*)&group->seal_bits.kernels, 20 * 
be32_native(group->seal_bits.nr_kerns));
+               sha1_finish(&ctx, *calc_hashes);
+               *calc_hashes = *calc_hashes + 20;
+               printk("\n");
+       }
+}

You should return an error if an unknown bit in extra_info_flags is set;
this will make it easier to extend the flags later.

One additional flag that would be useful (I can add it later if you don't
want to add it in the first version):

VTPM_QUOTE_FLAGS_GROUP_PUBKEY - value is SHA1(group->id_data.saa_pubkey).
        This value does not change when the configuration of a group is
updated, making it a less informative but more easily verified version of
VTPM_QUOTE_FLAGS_GROUP_INFO.

  /*
   * Sets up resettable PCRs for a vTPM deep quote request
   */
@@ -273,18 +316,44 @@ int group_do_activate(struct mem_group *group, void* 
blob, int blobSize,

  int vtpm_do_quote(struct mem_group *group, const uuid_t uuid,
        const uint8_t* kern_hash, const struct tpm_authdata *data, 
TPM_PCR_SELECTION *sel,
-       void* pcr_out, uint32_t *pcr_size, void* sig_out)
+       uint32_t extra_info_flags, void* pcr_out, uint32_t *pcr_size, void* 
sig_out)
  {
        TPM_HANDLE handle;
        TPM_AUTH_SESSION oiap = TPM_AUTH_SESSION_INIT;
        TPM_PCR_COMPOSITE pcrs;
        BYTE* sig;
        UINT32 size;
-       int rc;
+       sha1_context ctx;
+       TPM_DIGEST externData;
+       const void* data_to_quote = data;
+       UINT32 pcrSelSize = sel->sizeOfSelect;
+       unsigned char* ppcr_out = (unsigned char*)pcr_out;
+       unsigned char** pcr_outv = (unsigned char**)&ppcr_out;

-       rc = do_pcr_setup(group, uuid, kern_hash);
-       if (rc)
-               return rc;
+       int rc;
+       if(extra_info_flags == 0){
+               printk("Extra Info Flags == 0, hope you are on locality 2\n");
+               rc = do_pcr_setup(group, uuid, kern_hash);
+               if (rc)
+                       return rc;
+       }
+       else{
+               printk("Extra Info Flags =0x%x\n",extra_info_flags);
+               //resetting pcr selection
+               if(sel->sizeOfSelect > sizeof(sel->pcrSelect))
+                       pcrSelSize = sizeof(sel->pcrSelect);
+               memset(sel->pcrSelect,0,pcrSelSize);
+
+               sha1_starts(&ctx);
+               sha1_update(&ctx, (void*)&extra_info_flags, 4);
+               sha1_update(&ctx, (void*)data, 20);
+               do_vtpminfo_hash(extra_info_flags,group, uuid, kern_hash, 
pcr_outv);
+               *pcr_size = *pcr_outv - (unsigned char*)pcr_out;

The values of pcr_out and pcr_size will be NULL when called from GroupRegister.

+               if(*pcr_size > 0)
+                       sha1_update(&ctx, pcr_out, *pcr_size);
+               sha1_finish(&ctx, externData.digest);
+               data_to_quote = (void*)externData.digest;
+       }

        rc = do_load_aik(group, &handle);
        if (rc)
@@ -296,8 +365,7 @@ int vtpm_do_quote(struct mem_group *group, const uuid_t 
uuid,
                return rc;
        }

-       rc = TPM_Quote(handle, (void*)data, sel, (void*)&group->aik_authdata, &oiap, 
&pcrs, &sig, &size);
-       printk("TPM_Quote: %d\n", rc);
+       rc = TPM_Quote(handle, data_to_quote, sel, (void*)&group->aik_authdata, &oiap, 
&pcrs, &sig, &size);

        TPM_TerminateHandle(oiap.AuthHandle);
        TPM_FlushSpecific(handle, TPM_RT_KEY);
@@ -310,8 +378,11 @@ int vtpm_do_quote(struct mem_group *group, const uuid_t 
uuid,
        }

        if (pcr_out) {
-               *pcr_size = pcrs.valueSize;
-               memcpy(pcr_out, pcrs.pcrValue, *pcr_size);
+               /*hashes already copied when flags!=0 by do_vtpminfo_hash*/
+               if(extra_info_flags == 0){
+                       *pcr_size = pcrs.valueSize;
+                       memcpy(pcr_out, pcrs.pcrValue, *pcr_size);
+               }
        }

I think it would be useful to append the PCR values to the externData values,
as long as the entire set of hashes doesn't risk becoming too long.

--
Daniel De Graaf
National Security Agency

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.