mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-10 16:30:19 +00:00
f8faffac89
Signed-off-by: Marcel Lauhoff <marcel.lauhoff@suse.com>
327 lines
10 KiB
Go
327 lines
10 KiB
Go
/*
|
|
* fs_keyring.go - Add/remove encryption policy keys to/from filesystem
|
|
*
|
|
* Copyright 2019 Google LLC
|
|
* Author: Eric Biggers (ebiggers@google.com)
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
* use this file except in compliance with the License. You may obtain a copy of
|
|
* the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations under
|
|
* the License.
|
|
*/
|
|
|
|
package keyring
|
|
|
|
/*
|
|
#include <string.h>
|
|
*/
|
|
import "C"
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"log"
|
|
"os"
|
|
"os/user"
|
|
"sync"
|
|
"unsafe"
|
|
|
|
"github.com/pkg/errors"
|
|
"golang.org/x/sys/unix"
|
|
|
|
"github.com/google/fscrypt/crypto"
|
|
"github.com/google/fscrypt/filesystem"
|
|
"github.com/google/fscrypt/security"
|
|
"github.com/google/fscrypt/util"
|
|
)
|
|
|
|
var (
|
|
fsKeyringSupported bool
|
|
fsKeyringSupportedKnown bool
|
|
fsKeyringSupportedLock sync.Mutex
|
|
)
|
|
|
|
func checkForFsKeyringSupport(mount *filesystem.Mount) bool {
|
|
dir, err := os.Open(mount.Path)
|
|
if err != nil {
|
|
log.Printf("Unexpected error opening %q. Assuming filesystem keyring is unsupported.",
|
|
mount.Path)
|
|
return false
|
|
}
|
|
defer dir.Close()
|
|
|
|
// FS_IOC_ADD_ENCRYPTION_KEY with a NULL argument will fail with ENOTTY
|
|
// if the ioctl isn't supported. Otherwise it should fail with EFAULT.
|
|
//
|
|
// Note that there's no need to check for FS_IOC_REMOVE_ENCRYPTION_KEY
|
|
// support separately, since it's guaranteed to be available if
|
|
// FS_IOC_ADD_ENCRYPTION_KEY is. There's also no need to check for
|
|
// support on every filesystem separately, since either the kernel
|
|
// supports the ioctls on all fscrypt-capable filesystems or it doesn't.
|
|
_, _, errno := unix.Syscall(unix.SYS_IOCTL, dir.Fd(), unix.FS_IOC_ADD_ENCRYPTION_KEY, 0)
|
|
if errno == unix.ENOTTY {
|
|
log.Printf("Kernel doesn't support filesystem keyring. Falling back to user keyring.")
|
|
return false
|
|
}
|
|
if errno == unix.EFAULT {
|
|
log.Printf("Detected support for filesystem keyring")
|
|
} else {
|
|
// EFAULT is expected, but as long as we didn't get ENOTTY the
|
|
// ioctl should be available.
|
|
log.Printf("Unexpected error from FS_IOC_ADD_ENCRYPTION_KEY(%q, NULL): %v", mount.Path, errno)
|
|
}
|
|
return true
|
|
}
|
|
|
|
// IsFsKeyringSupported returns true if the kernel supports the ioctls to
|
|
// add/remove fscrypt keys directly to/from the filesystem. For support to be
|
|
// detected, the given Mount must be for a filesystem that supports fscrypt.
|
|
func IsFsKeyringSupported(mount *filesystem.Mount) bool {
|
|
fsKeyringSupportedLock.Lock()
|
|
defer fsKeyringSupportedLock.Unlock()
|
|
if !fsKeyringSupportedKnown {
|
|
fsKeyringSupported = checkForFsKeyringSupport(mount)
|
|
fsKeyringSupportedKnown = true
|
|
}
|
|
return fsKeyringSupported
|
|
}
|
|
|
|
// buildKeySpecifier converts the key descriptor string to an FscryptKeySpecifier.
|
|
func buildKeySpecifier(spec *unix.FscryptKeySpecifier, descriptor string) error {
|
|
descriptorBytes, err := hex.DecodeString(descriptor)
|
|
if err != nil {
|
|
return errors.Errorf("key descriptor %q is invalid", descriptor)
|
|
}
|
|
switch len(descriptorBytes) {
|
|
case unix.FSCRYPT_KEY_DESCRIPTOR_SIZE:
|
|
spec.Type = unix.FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR
|
|
case unix.FSCRYPT_KEY_IDENTIFIER_SIZE:
|
|
spec.Type = unix.FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER
|
|
default:
|
|
return errors.Errorf("key descriptor %q has unknown length", descriptor)
|
|
}
|
|
copy(spec.U[:], descriptorBytes)
|
|
return nil
|
|
}
|
|
|
|
type savedPrivs struct {
|
|
ruid, euid, suid int
|
|
}
|
|
|
|
// dropPrivsIfNeeded drops privileges (UIDs only) to the given user if we're
|
|
// working with a v2 policy key, and if the user is different from the user the
|
|
// process is currently running as.
|
|
//
|
|
// This is needed to change the effective UID so that FS_IOC_ADD_ENCRYPTION_KEY
|
|
// and FS_IOC_REMOVE_ENCRYPTION_KEY will add/remove a claim to the key for the
|
|
// intended user, and so that FS_IOC_GET_ENCRYPTION_KEY_STATUS will return the
|
|
// correct status flags for the user.
|
|
func dropPrivsIfNeeded(user *user.User, spec *unix.FscryptKeySpecifier) (*savedPrivs, error) {
|
|
if spec.Type == unix.FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR {
|
|
// v1 policy keys don't have any concept of user claims.
|
|
return nil, nil
|
|
}
|
|
targetUID := util.AtoiOrPanic(user.Uid)
|
|
ruid, euid, suid := security.GetUids()
|
|
if euid == targetUID {
|
|
return nil, nil
|
|
}
|
|
if err := security.SetUids(targetUID, targetUID, euid); err != nil {
|
|
return nil, err
|
|
}
|
|
return &savedPrivs{ruid, euid, suid}, nil
|
|
}
|
|
|
|
// restorePrivs restores root privileges if needed.
|
|
func restorePrivs(privs *savedPrivs) error {
|
|
if privs != nil {
|
|
return security.SetUids(privs.ruid, privs.euid, privs.suid)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// validateKeyDescriptor validates that the correct key descriptor was provided.
|
|
// This isn't really necessary; this is just an extra sanity check.
|
|
func validateKeyDescriptor(spec *unix.FscryptKeySpecifier, descriptor string) (string, error) {
|
|
if spec.Type != unix.FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER {
|
|
// v1 policy key: the descriptor is chosen arbitrarily by
|
|
// userspace, so there's nothing to validate.
|
|
return descriptor, nil
|
|
}
|
|
// v2 policy key. The descriptor ("identifier" in the kernel UAPI) is
|
|
// calculated as a cryptographic hash of the key itself. The kernel
|
|
// ignores the provided value, and calculates and returns it itself. So
|
|
// verify that the returned value is as expected. If it's not, the key
|
|
// doesn't actually match the encryption policy we thought it was for.
|
|
actual := hex.EncodeToString(spec.U[:unix.FSCRYPT_KEY_IDENTIFIER_SIZE])
|
|
if descriptor == actual {
|
|
return descriptor, nil
|
|
}
|
|
return actual,
|
|
errors.Errorf("provided and actual key descriptors differ (%q != %q)",
|
|
descriptor, actual)
|
|
}
|
|
|
|
// fsAddEncryptionKey adds the specified encryption key to the specified filesystem.
|
|
func fsAddEncryptionKey(key *crypto.Key, descriptor string,
|
|
mount *filesystem.Mount, user *user.User) error {
|
|
|
|
dir, err := os.Open(mount.Path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer dir.Close()
|
|
|
|
argKey, err := crypto.NewBlankKey(int(unsafe.Sizeof(unix.FscryptAddKeyArg{})) + key.Len())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer argKey.Wipe()
|
|
arg := (*unix.FscryptAddKeyArg)(argKey.UnsafePtr())
|
|
|
|
if err = buildKeySpecifier(&arg.Key_spec, descriptor); err != nil {
|
|
return err
|
|
}
|
|
|
|
raw := unsafe.Pointer(uintptr(argKey.UnsafePtr()) + unsafe.Sizeof(*arg))
|
|
arg.Raw_size = uint32(key.Len())
|
|
C.memcpy(raw, key.UnsafePtr(), C.size_t(key.Len()))
|
|
|
|
savedPrivs, err := dropPrivsIfNeeded(user, &arg.Key_spec)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, _, errno := unix.Syscall(unix.SYS_IOCTL, dir.Fd(),
|
|
unix.FS_IOC_ADD_ENCRYPTION_KEY, uintptr(argKey.UnsafePtr()))
|
|
restorePrivs(savedPrivs)
|
|
|
|
log.Printf("FS_IOC_ADD_ENCRYPTION_KEY(%q, %s, <raw>) = %v", mount.Path, descriptor, errno)
|
|
if errno != 0 {
|
|
return errors.Wrapf(errno,
|
|
"error adding key with descriptor %s to filesystem %s",
|
|
descriptor, mount.Path)
|
|
}
|
|
if descriptor, err = validateKeyDescriptor(&arg.Key_spec, descriptor); err != nil {
|
|
fsRemoveEncryptionKey(descriptor, mount, user)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// fsRemoveEncryptionKey removes the specified encryption key from the specified
|
|
// filesystem.
|
|
func fsRemoveEncryptionKey(descriptor string, mount *filesystem.Mount,
|
|
user *user.User) error {
|
|
|
|
dir, err := os.Open(mount.Path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer dir.Close()
|
|
|
|
var arg unix.FscryptRemoveKeyArg
|
|
if err = buildKeySpecifier(&arg.Key_spec, descriptor); err != nil {
|
|
return err
|
|
}
|
|
|
|
ioc := uintptr(unix.FS_IOC_REMOVE_ENCRYPTION_KEY)
|
|
iocName := "FS_IOC_REMOVE_ENCRYPTION_KEY"
|
|
var savedPrivs *savedPrivs
|
|
if user == nil {
|
|
ioc = unix.FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS
|
|
iocName = "FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS"
|
|
} else {
|
|
savedPrivs, err = dropPrivsIfNeeded(user, &arg.Key_spec)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
_, _, errno := unix.Syscall(unix.SYS_IOCTL, dir.Fd(), ioc, uintptr(unsafe.Pointer(&arg)))
|
|
restorePrivs(savedPrivs)
|
|
|
|
log.Printf("%s(%q, %s) = %v, removal_status_flags=0x%x",
|
|
iocName, mount.Path, descriptor, errno, arg.Removal_status_flags)
|
|
switch errno {
|
|
case 0:
|
|
switch {
|
|
case arg.Removal_status_flags&unix.FSCRYPT_KEY_REMOVAL_STATUS_FLAG_OTHER_USERS != 0:
|
|
return ErrKeyAddedByOtherUsers
|
|
case arg.Removal_status_flags&unix.FSCRYPT_KEY_REMOVAL_STATUS_FLAG_FILES_BUSY != 0:
|
|
return ErrKeyFilesOpen
|
|
}
|
|
return nil
|
|
case unix.ENOKEY:
|
|
// ENOKEY means either the key is completely missing or that the
|
|
// current user doesn't have a claim to it. Distinguish between
|
|
// these two cases by getting the key status.
|
|
if user != nil {
|
|
status, _ := fsGetEncryptionKeyStatus(descriptor, mount, user)
|
|
if status == KeyPresentButOnlyOtherUsers {
|
|
return ErrKeyAddedByOtherUsers
|
|
}
|
|
}
|
|
return ErrKeyNotPresent
|
|
default:
|
|
return errors.Wrapf(errno,
|
|
"error removing key with descriptor %s from filesystem %s",
|
|
descriptor, mount.Path)
|
|
}
|
|
}
|
|
|
|
// fsGetEncryptionKeyStatus gets the status of the specified encryption key on
|
|
// the specified filesystem.
|
|
func fsGetEncryptionKeyStatus(descriptor string, mount *filesystem.Mount,
|
|
user *user.User) (KeyStatus, error) {
|
|
|
|
dir, err := os.Open(mount.Path)
|
|
if err != nil {
|
|
return KeyStatusUnknown, err
|
|
}
|
|
defer dir.Close()
|
|
|
|
var arg unix.FscryptGetKeyStatusArg
|
|
err = buildKeySpecifier(&arg.Key_spec, descriptor)
|
|
if err != nil {
|
|
return KeyStatusUnknown, err
|
|
}
|
|
|
|
savedPrivs, err := dropPrivsIfNeeded(user, &arg.Key_spec)
|
|
if err != nil {
|
|
return KeyStatusUnknown, err
|
|
}
|
|
_, _, errno := unix.Syscall(unix.SYS_IOCTL, dir.Fd(),
|
|
unix.FS_IOC_GET_ENCRYPTION_KEY_STATUS, uintptr(unsafe.Pointer(&arg)))
|
|
restorePrivs(savedPrivs)
|
|
|
|
log.Printf("FS_IOC_GET_ENCRYPTION_KEY_STATUS(%q, %s) = %v, status=%d, status_flags=0x%x",
|
|
mount.Path, descriptor, errno, arg.Status, arg.Status_flags)
|
|
if errno != 0 {
|
|
return KeyStatusUnknown,
|
|
errors.Wrapf(errno,
|
|
"error getting status of key with descriptor %s on filesystem %s",
|
|
descriptor, mount.Path)
|
|
}
|
|
switch arg.Status {
|
|
case unix.FSCRYPT_KEY_STATUS_ABSENT:
|
|
return KeyAbsent, nil
|
|
case unix.FSCRYPT_KEY_STATUS_PRESENT:
|
|
if arg.Key_spec.Type != unix.FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR &&
|
|
(arg.Status_flags&unix.FSCRYPT_KEY_STATUS_FLAG_ADDED_BY_SELF) == 0 {
|
|
return KeyPresentButOnlyOtherUsers, nil
|
|
}
|
|
return KeyPresent, nil
|
|
case unix.FSCRYPT_KEY_STATUS_INCOMPLETELY_REMOVED:
|
|
return KeyAbsentButFilesBusy, nil
|
|
default:
|
|
return KeyStatusUnknown,
|
|
errors.Errorf("unknown key status (%d) for key with descriptor %s on filesystem %s",
|
|
arg.Status, descriptor, mount.Path)
|
|
}
|
|
}
|