123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428 |
- ==========================
- Trusted and Encrypted Keys
- ==========================
- Trusted and Encrypted Keys are two new key types added to the existing kernel
- key ring service. Both of these new types are variable length symmetric keys,
- and in both cases all keys are created in the kernel, and user space sees,
- stores, and loads only encrypted blobs. Trusted Keys require the availability
- of a Trust Source for greater security, while Encrypted Keys can be used on any
- system. All user level blobs, are displayed and loaded in hex ASCII for
- convenience, and are integrity verified.
- Trust Source
- ============
- A trust source provides the source of security for Trusted Keys. This
- section lists currently supported trust sources, along with their security
- considerations. Whether or not a trust source is sufficiently safe depends
- on the strength and correctness of its implementation, as well as the threat
- environment for a specific use case. Since the kernel doesn't know what the
- environment is, and there is no metric of trust, it is dependent on the
- consumer of the Trusted Keys to determine if the trust source is sufficiently
- safe.
- * Root of trust for storage
- (1) TPM (Trusted Platform Module: hardware device)
- Rooted to Storage Root Key (SRK) which never leaves the TPM that
- provides crypto operation to establish root of trust for storage.
- (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone)
- Rooted to Hardware Unique Key (HUK) which is generally burnt in on-chip
- fuses and is accessible to TEE only.
- (3) CAAM (Cryptographic Acceleration and Assurance Module: IP on NXP SoCs)
- When High Assurance Boot (HAB) is enabled and the CAAM is in secure
- mode, trust is rooted to the OTPMK, a never-disclosed 256-bit key
- randomly generated and fused into each SoC at manufacturing time.
- Otherwise, a common fixed test key is used instead.
- * Execution isolation
- (1) TPM
- Fixed set of operations running in isolated execution environment.
- (2) TEE
- Customizable set of operations running in isolated execution
- environment verified via Secure/Trusted boot process.
- (3) CAAM
- Fixed set of operations running in isolated execution environment.
- * Optional binding to platform integrity state
- (1) TPM
- Keys can be optionally sealed to specified PCR (integrity measurement)
- values, and only unsealed by the TPM, if PCRs and blob integrity
- verifications match. A loaded Trusted Key can be updated with new
- (future) PCR values, so keys are easily migrated to new PCR values,
- such as when the kernel and initramfs are updated. The same key can
- have many saved blobs under different PCR values, so multiple boots are
- easily supported.
- (2) TEE
- Relies on Secure/Trusted boot process for platform integrity. It can
- be extended with TEE based measured boot process.
- (3) CAAM
- Relies on the High Assurance Boot (HAB) mechanism of NXP SoCs
- for platform integrity.
- * Interfaces and APIs
- (1) TPM
- TPMs have well-documented, standardized interfaces and APIs.
- (2) TEE
- TEEs have well-documented, standardized client interface and APIs. For
- more details refer to ``Documentation/staging/tee.rst``.
- (3) CAAM
- Interface is specific to silicon vendor.
- * Threat model
- The strength and appropriateness of a particular trust source for a given
- purpose must be assessed when using them to protect security-relevant data.
- Key Generation
- ==============
- Trusted Keys
- ------------
- New keys are created from random numbers. They are encrypted/decrypted using
- a child key in the storage key hierarchy. Encryption and decryption of the
- child key must be protected by a strong access control policy within the
- trust source. The random number generator in use differs according to the
- selected trust source:
- * TPM: hardware device based RNG
- Keys are generated within the TPM. Strength of random numbers may vary
- from one device manufacturer to another.
- * TEE: OP-TEE based on Arm TrustZone based RNG
- RNG is customizable as per platform needs. It can either be direct output
- from platform specific hardware RNG or a software based Fortuna CSPRNG
- which can be seeded via multiple entropy sources.
- * CAAM: Kernel RNG
- The normal kernel random number generator is used. To seed it from the
- CAAM HWRNG, enable CRYPTO_DEV_FSL_CAAM_RNG_API and ensure the device
- is probed.
- Users may override this by specifying ``trusted.rng=kernel`` on the kernel
- command-line to override the used RNG with the kernel's random number pool.
- Encrypted Keys
- --------------
- Encrypted keys do not depend on a trust source, and are faster, as they use AES
- for encryption/decryption. New keys are created either from kernel-generated
- random numbers or user-provided decrypted data, and are encrypted/decrypted
- using a specified ‘master’ key. The ‘master’ key can either be a trusted-key or
- user-key type. The main disadvantage of encrypted keys is that if they are not
- rooted in a trusted key, they are only as secure as the user key encrypting
- them. The master user key should therefore be loaded in as secure a way as
- possible, preferably early in boot.
- Usage
- =====
- Trusted Keys usage: TPM
- -----------------------
- TPM 1.2: By default, trusted keys are sealed under the SRK, which has the
- default authorization value (20 bytes of 0s). This can be set at takeownership
- time with the TrouSerS utility: "tpm_takeownership -u -z".
- TPM 2.0: The user must first create a storage key and make it persistent, so the
- key is available after reboot. This can be done using the following commands.
- With the IBM TSS 2 stack::
- #> tsscreateprimary -hi o -st
- Handle 80000000
- #> tssevictcontrol -hi o -ho 80000000 -hp 81000001
- Or with the Intel TSS 2 stack::
- #> tpm2_createprimary --hierarchy o -G rsa2048 -c key.ctxt
- [...]
- #> tpm2_evictcontrol -c key.ctxt 0x81000001
- persistentHandle: 0x81000001
- Usage::
- keyctl add trusted name "new keylen [options]" ring
- keyctl add trusted name "load hex_blob [pcrlock=pcrnum]" ring
- keyctl update key "update [options]"
- keyctl print keyid
- options:
- keyhandle= ascii hex value of sealing key
- TPM 1.2: default 0x40000000 (SRK)
- TPM 2.0: no default; must be passed every time
- keyauth= ascii hex auth for sealing key default 0x00...i
- (40 ascii zeros)
- blobauth= ascii hex auth for sealed data default 0x00...
- (40 ascii zeros)
- pcrinfo= ascii hex of PCR_INFO or PCR_INFO_LONG (no default)
- pcrlock= pcr number to be extended to "lock" blob
- migratable= 0|1 indicating permission to reseal to new PCR values,
- default 1 (resealing allowed)
- hash= hash algorithm name as a string. For TPM 1.x the only
- allowed value is sha1. For TPM 2.x the allowed values
- are sha1, sha256, sha384, sha512 and sm3-256.
- policydigest= digest for the authorization policy. must be calculated
- with the same hash algorithm as specified by the 'hash='
- option.
- policyhandle= handle to an authorization policy session that defines the
- same policy and with the same hash algorithm as was used to
- seal the key.
- "keyctl print" returns an ascii hex copy of the sealed key, which is in standard
- TPM_STORED_DATA format. The key length for new keys are always in bytes.
- Trusted Keys can be 32 - 128 bytes (256 - 1024 bits), the upper limit is to fit
- within the 2048 bit SRK (RSA) keylength, with all necessary structure/padding.
- Trusted Keys usage: TEE
- -----------------------
- Usage::
- keyctl add trusted name "new keylen" ring
- keyctl add trusted name "load hex_blob" ring
- keyctl print keyid
- "keyctl print" returns an ASCII hex copy of the sealed key, which is in format
- specific to TEE device implementation. The key length for new keys is always
- in bytes. Trusted Keys can be 32 - 128 bytes (256 - 1024 bits).
- Trusted Keys usage: CAAM
- ------------------------
- Usage::
- keyctl add trusted name "new keylen" ring
- keyctl add trusted name "load hex_blob" ring
- keyctl print keyid
- "keyctl print" returns an ASCII hex copy of the sealed key, which is in a
- CAAM-specific format. The key length for new keys is always in bytes.
- Trusted Keys can be 32 - 128 bytes (256 - 1024 bits).
- Encrypted Keys usage
- --------------------
- The decrypted portion of encrypted keys can contain either a simple symmetric
- key or a more complex structure. The format of the more complex structure is
- application specific, which is identified by 'format'.
- Usage::
- keyctl add encrypted name "new [format] key-type:master-key-name keylen"
- ring
- keyctl add encrypted name "new [format] key-type:master-key-name keylen
- decrypted-data" ring
- keyctl add encrypted name "load hex_blob" ring
- keyctl update keyid "update key-type:master-key-name"
- Where::
- format:= 'default | ecryptfs | enc32'
- key-type:= 'trusted' | 'user'
- Examples of trusted and encrypted key usage
- -------------------------------------------
- Create and save a trusted key named "kmk" of length 32 bytes.
- Note: When using a TPM 2.0 with a persistent key with handle 0x81000001,
- append 'keyhandle=0x81000001' to statements between quotes, such as
- "new 32 keyhandle=0x81000001".
- ::
- $ keyctl add trusted kmk "new 32" @u
- 440502848
- $ keyctl show
- Session Keyring
- -3 --alswrv 500 500 keyring: _ses
- 97833714 --alswrv 500 -1 \_ keyring: _uid.500
- 440502848 --alswrv 500 500 \_ trusted: kmk
- $ keyctl print 440502848
- 0101000000000000000001005d01b7e3f4a6be5709930f3b70a743cbb42e0cc95e18e915
- 3f60da455bbf1144ad12e4f92b452f966929f6105fd29ca28e4d4d5a031d068478bacb0b
- 27351119f822911b0a11ba3d3498ba6a32e50dac7f32894dd890eb9ad578e4e292c83722
- a52e56a097e6a68b3f56f7a52ece0cdccba1eb62cad7d817f6dc58898b3ac15f36026fec
- d568bd4a706cb60bb37be6d8f1240661199d640b66fb0fe3b079f97f450b9ef9c22c6d5d
- dd379f0facd1cd020281dfa3c70ba21a3fa6fc2471dc6d13ecf8298b946f65345faa5ef0
- f1f8fff03ad0acb083725535636addb08d73dedb9832da198081e5deae84bfaf0409c22b
- e4a8aea2b607ec96931e6f4d4fe563ba
- $ keyctl pipe 440502848 > kmk.blob
- Load a trusted key from the saved blob::
- $ keyctl add trusted kmk "load `cat kmk.blob`" @u
- 268728824
- $ keyctl print 268728824
- 0101000000000000000001005d01b7e3f4a6be5709930f3b70a743cbb42e0cc95e18e915
- 3f60da455bbf1144ad12e4f92b452f966929f6105fd29ca28e4d4d5a031d068478bacb0b
- 27351119f822911b0a11ba3d3498ba6a32e50dac7f32894dd890eb9ad578e4e292c83722
- a52e56a097e6a68b3f56f7a52ece0cdccba1eb62cad7d817f6dc58898b3ac15f36026fec
- d568bd4a706cb60bb37be6d8f1240661199d640b66fb0fe3b079f97f450b9ef9c22c6d5d
- dd379f0facd1cd020281dfa3c70ba21a3fa6fc2471dc6d13ecf8298b946f65345faa5ef0
- f1f8fff03ad0acb083725535636addb08d73dedb9832da198081e5deae84bfaf0409c22b
- e4a8aea2b607ec96931e6f4d4fe563ba
- Reseal (TPM specific) a trusted key under new PCR values::
- $ keyctl update 268728824 "update pcrinfo=`cat pcr.blob`"
- $ keyctl print 268728824
- 010100000000002c0002800093c35a09b70fff26e7a98ae786c641e678ec6ffb6b46d805
- 77c8a6377aed9d3219c6dfec4b23ffe3000001005d37d472ac8a44023fbb3d18583a4f73
- d3a076c0858f6f1dcaa39ea0f119911ff03f5406df4f7f27f41da8d7194f45c9f4e00f2e
- df449f266253aa3f52e55c53de147773e00f0f9aca86c64d94c95382265968c354c5eab4
- 9638c5ae99c89de1e0997242edfb0b501744e11ff9762dfd951cffd93227cc513384e7e6
- e782c29435c7ec2edafaa2f4c1fe6e7a781b59549ff5296371b42133777dcc5b8b971610
- 94bc67ede19e43ddb9dc2baacad374a36feaf0314d700af0a65c164b7082401740e489c9
- 7ef6a24defe4846104209bf0c3eced7fa1a672ed5b125fc9d8cd88b476a658a4434644ef
- df8ae9a178e9f83ba9f08d10fa47e4226b98b0702f06b3b8
- The initial consumer of trusted keys is EVM, which at boot time needs a high
- quality symmetric key for HMAC protection of file metadata. The use of a
- trusted key provides strong guarantees that the EVM key has not been
- compromised by a user level problem, and when sealed to a platform integrity
- state, protects against boot and offline attacks. Create and save an
- encrypted key "evm" using the above trusted key "kmk":
- option 1: omitting 'format'::
- $ keyctl add encrypted evm "new trusted:kmk 32" @u
- 159771175
- option 2: explicitly defining 'format' as 'default'::
- $ keyctl add encrypted evm "new default trusted:kmk 32" @u
- 159771175
- $ keyctl print 159771175
- default trusted:kmk 32 2375725ad57798846a9bbd240de8906f006e66c03af53b1b3
- 82dbbc55be2a44616e4959430436dc4f2a7a9659aa60bb4652aeb2120f149ed197c564e0
- 24717c64 5972dcb82ab2dde83376d82b2e3c09ffc
- $ keyctl pipe 159771175 > evm.blob
- Load an encrypted key "evm" from saved blob::
- $ keyctl add encrypted evm "load `cat evm.blob`" @u
- 831684262
- $ keyctl print 831684262
- default trusted:kmk 32 2375725ad57798846a9bbd240de8906f006e66c03af53b1b3
- 82dbbc55be2a44616e4959430436dc4f2a7a9659aa60bb4652aeb2120f149ed197c564e0
- 24717c64 5972dcb82ab2dde83376d82b2e3c09ffc
- Instantiate an encrypted key "evm" using user-provided decrypted data::
- $ evmkey=$(dd if=/dev/urandom bs=1 count=32 | xxd -c32 -p)
- $ keyctl add encrypted evm "new default user:kmk 32 $evmkey" @u
- 794890253
- $ keyctl print 794890253
- default user:kmk 32 2375725ad57798846a9bbd240de8906f006e66c03af53b1b382d
- bbc55be2a44616e4959430436dc4f2a7a9659aa60bb4652aeb2120f149ed197c564e0247
- 17c64 5972dcb82ab2dde83376d82b2e3c09ffc
- Other uses for trusted and encrypted keys, such as for disk and file encryption
- are anticipated. In particular the new format 'ecryptfs' has been defined
- in order to use encrypted keys to mount an eCryptfs filesystem. More details
- about the usage can be found in the file
- ``Documentation/security/keys/ecryptfs.rst``.
- Another new format 'enc32' has been defined in order to support encrypted keys
- with payload size of 32 bytes. This will initially be used for nvdimm security
- but may expand to other usages that require 32 bytes payload.
- TPM 2.0 ASN.1 Key Format
- ------------------------
- The TPM 2.0 ASN.1 key format is designed to be easily recognisable,
- even in binary form (fixing a problem we had with the TPM 1.2 ASN.1
- format) and to be extensible for additions like importable keys and
- policy::
- TPMKey ::= SEQUENCE {
- type OBJECT IDENTIFIER
- emptyAuth [0] EXPLICIT BOOLEAN OPTIONAL
- parent INTEGER
- pubkey OCTET STRING
- privkey OCTET STRING
- }
- type is what distinguishes the key even in binary form since the OID
- is provided by the TCG to be unique and thus forms a recognizable
- binary pattern at offset 3 in the key. The OIDs currently made
- available are::
- 2.23.133.10.1.3 TPM Loadable key. This is an asymmetric key (Usually
- RSA2048 or Elliptic Curve) which can be imported by a
- TPM2_Load() operation.
- 2.23.133.10.1.4 TPM Importable Key. This is an asymmetric key (Usually
- RSA2048 or Elliptic Curve) which can be imported by a
- TPM2_Import() operation.
- 2.23.133.10.1.5 TPM Sealed Data. This is a set of data (up to 128
- bytes) which is sealed by the TPM. It usually
- represents a symmetric key and must be unsealed before
- use.
- The trusted key code only uses the TPM Sealed Data OID.
- emptyAuth is true if the key has well known authorization "". If it
- is false or not present, the key requires an explicit authorization
- phrase. This is used by most user space consumers to decide whether
- to prompt for a password.
- parent represents the parent key handle, either in the 0x81 MSO space,
- like 0x81000001 for the RSA primary storage key. Userspace programmes
- also support specifying the primary handle in the 0x40 MSO space. If
- this happens the Elliptic Curve variant of the primary key using the
- TCG defined template will be generated on the fly into a volatile
- object and used as the parent. The current kernel code only supports
- the 0x81 MSO form.
- pubkey is the binary representation of TPM2B_PRIVATE excluding the
- initial TPM2B header, which can be reconstructed from the ASN.1 octet
- string length.
- privkey is the binary representation of TPM2B_PUBLIC excluding the
- initial TPM2B header which can be reconstructed from the ASN.1 octed
- string length.
|