KEYS: validate certificate trust only with builtin keys
authorDmitry Kasatkin <d.kasatkin@samsung.com>
Tue, 17 Jun 2014 08:56:59 +0000 (11:56 +0300)
committerMimi Zohar <zohar@linux.vnet.ibm.com>
Thu, 17 Jul 2014 13:35:17 +0000 (09:35 -0400)
Instead of allowing public keys, with certificates signed by any
key on the system trusted keyring, to be added to a trusted keyring,
this patch further restricts the certificates to those signed only by
builtin keys on the system keyring.

This patch defines a new option 'builtin' for the kernel parameter
'keys_ownerid' to allow trust validation using builtin keys.

Simplified Mimi's "KEYS: define an owner trusted keyring" patch

Changelog v7:
- rename builtin_keys to use_builtin_keys

Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Documentation/kernel-parameters.txt
crypto/asymmetric_keys/x509_public_key.c
include/linux/key.h
kernel/system_keyring.c

index bdb193afe176fc845c4b805ed6973d4872c8fe4e..90c12c59116830cd67e7fecda515f0ee33a8a103 100644 (file)
@@ -569,7 +569,7 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
        ca_keys=        [KEYS] This parameter identifies a specific key(s) on
                        the system trusted keyring to be used for certificate
                        trust validation.
-                       format: id:<keyid>
+                       format: { id:<keyid> | builtin }
 
        ccw_timeout_log [S390]
                        See Documentation/s390/CommonIO for details.
index d376195e1d08a3f1f9a65aadeb7f095f711ad4a2..927ce755ff67a9fb3f4feb06cf5f24d3272fe9ad 100644 (file)
@@ -24,6 +24,7 @@
 #include "public_key.h"
 #include "x509_parser.h"
 
+static bool use_builtin_keys;
 static char *ca_keyid;
 
 #ifndef MODULE
@@ -34,6 +35,8 @@ static int __init ca_keys_setup(char *str)
 
        if (strncmp(str, "id:", 3) == 0)
                ca_keyid = str; /* owner key 'id:xxxxxx' */
+       else if (strcmp(str, "builtin") == 0)
+               use_builtin_keys = true;
 
        return 1;
 }
@@ -180,7 +183,6 @@ EXPORT_SYMBOL_GPL(x509_check_signature);
 static int x509_validate_trust(struct x509_certificate *cert,
                               struct key *trust_keyring)
 {
-       const struct public_key *pk;
        struct key *key;
        int ret = 1;
 
@@ -195,8 +197,9 @@ static int x509_validate_trust(struct x509_certificate *cert,
                                          cert->authority,
                                          strlen(cert->authority));
        if (!IS_ERR(key))  {
-               pk = key->payload.data;
-               ret = x509_check_signature(pk, cert);
+               if (!use_builtin_keys
+                   || test_bit(KEY_FLAG_BUILTIN, &key->flags))
+                       ret = x509_check_signature(key->payload.data, cert);
                key_put(key);
        }
        return ret;
index 017b0826642f04c070137114ee98958737677cd6..65316f7ae79437a8bfedcb0ed2a3338dafab3b7e 100644 (file)
@@ -170,6 +170,7 @@ struct key {
 #define KEY_FLAG_INVALIDATED   7       /* set if key has been invalidated */
 #define KEY_FLAG_TRUSTED       8       /* set if key is trusted */
 #define KEY_FLAG_TRUSTED_ONLY  9       /* set if keyring only accepts links to trusted keys */
+#define KEY_FLAG_BUILTIN       10      /* set if key is builtin */
 
        /* the key type and key description string
         * - the desc is used to match a key against search criteria
index 52ebc70263f4d8e806dc436fd55e6000cf818915..875f64e8935bbf1f27320a42ae467f170b09e3d9 100644 (file)
@@ -89,6 +89,7 @@ static __init int load_system_certificate_list(void)
                        pr_err("Problem loading in-kernel X.509 certificate (%ld)\n",
                               PTR_ERR(key));
                } else {
+                       set_bit(KEY_FLAG_BUILTIN, &key_ref_to_ptr(key)->flags);
                        pr_notice("Loaded X.509 cert '%s'\n",
                                  key_ref_to_ptr(key)->description);
                        key_ref_put(key);