[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] vtpmmgr: add example control tools
commit ffa11862aa431494e809c6e99f7358c12cb67e44 Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> AuthorDate: Mon Apr 21 13:22:58 2014 -0400 Commit: Ian Campbell <ian.campbell@xxxxxxxxxx> CommitDate: Wed Apr 23 11:57:42 2014 +0100 vtpmmgr: add example control tools The manage-vtpmmgr.pl script is an example client for interacting with the TPM Manager; it is intended to run in a management domain with a vTPM (which may be dom0). It is used to create and manage vTPMs and vTPM groups. The calc.pl script is an example manager of a vTPM group. It signs the configuration lists used by the TPM Manager with a locally held private key. Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> --- config/Tools.mk.in | 1 + tools/Makefile | 1 + tools/vtpmmgr/Makefile | 15 ++++ tools/vtpmmgr/calc.pl | 97 +++++++++++++++++++++++ tools/vtpmmgr/manage-vtpmmgr.pl | 160 +++++++++++++++++++++++++++++++++++++++ 5 files changed, 274 insertions(+), 0 deletions(-) diff --git a/config/Tools.mk.in b/config/Tools.mk.in index 0bdf37a..18f3b8a 100644 --- a/config/Tools.mk.in +++ b/config/Tools.mk.in @@ -54,6 +54,7 @@ CONFIG_SEABIOS := @seabios@ CONFIG_QEMU_TRAD := @qemu_traditional@ CONFIG_QEMU_XEN := @qemu_xen@ CONFIG_BLKTAP1 := @blktap1@ +CONFIG_VTPM := @vtpm@ #System options ZLIB := @zlib@ diff --git a/tools/Makefile b/tools/Makefile index c3cfb38..2d32f27 100644 --- a/tools/Makefile +++ b/tools/Makefile @@ -38,6 +38,7 @@ SUBDIRS-$(CONFIG_X86) += xenpaging SUBDIRS-$(CONFIG_X86) += debugger/gdbsx SUBDIRS-$(CONFIG_X86) += debugger/kdd SUBDIRS-$(CONFIG_TESTS) += tests +SUBDIRS-$(CONFIG_VTPM) += vtpmmgr # These don't cross-compile ifeq ($(XEN_COMPILE_ARCH),$(XEN_TARGET_ARCH)) diff --git a/tools/vtpmmgr/Makefile b/tools/vtpmmgr/Makefile new file mode 100644 index 0000000..8890b06 --- /dev/null +++ b/tools/vtpmmgr/Makefile @@ -0,0 +1,15 @@ +XEN_ROOT=$(CURDIR)/../.. +include $(XEN_ROOT)/tools/Rules.mk + +all: + @true + +install: + $(INSTALL_DIR) "$(DESTDIR)$(LIBEXEC)" + $(INSTALL_DATA) calc.pl "$(DESTDIR)$(LIBEXEC)" + $(INSTALL_DATA) manage-vtpmmgr.pl "$(DESTDIR)$(LIBEXEC)" + +clean: + @true + +.PHONY: all install clean diff --git a/tools/vtpmmgr/calc.pl b/tools/vtpmmgr/calc.pl new file mode 100755 index 0000000..4183733 --- /dev/null +++ b/tools/vtpmmgr/calc.pl @@ -0,0 +1,97 @@ +#!/usr/bin/perl +use strict; +use Digest::SHA qw(sha1); +use Math::BigInt only => 'GMP'; + +my $s2 = Digest::SHA->new("SHA256"); + +# The key below is an example; its private key is (obviously) not private. This +# key must be protected at least as well as the vTPM's secrets, since it can +# approve the release of these secrets to a new TCB. It may make sense to +# modify this script to use a TPM or some other hardware key storage device to +# hold the private key instead of holding the key in plaintext; such integration +# is beyond the scope of this example script. +# +# The public exponent of this key must be 65537 (0x10001); this is the default +# for TPM-generated RSA keys. +# +# The manage-tpmmgr.pl script expects the modulus of this RSA key to be +# available; this may be done using: +# +# open KEY, '>rsa-modulus-file'; +# print KEY pack 'H*', $rsa_n; +# close KEY; + +my $rsa_n = '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'; +my $rsa_d = '3229508daed80173f4114744e111beccf982d0d6a7c8c6484c3da3259535ee9b21083690ac1d7c71c742c9ed1994db7894c562e39716a4106c8ba738f936e310e563b96ff60c00c6757ae53918b8c2a158d100c5c63384a5fc21ac1ee42bc3b5de7c5788d4889d364f8c21e137fe162dc1964b78b682250bc5a6c4e686c6849cf8f0020f6ca383d784e5ffb85da56c2b89dc2e879509b1916c8b51f5907a0dbb7e2f9e5fabc500588ef7db6f78ba4605da86d907493648017ac46a1571ffe9b6a68babeeb277e3a96d346cddc996a94163f1e8393d88f710ff64369a62d3edfc62dbdeae57ee12a33adbb9b9d48d575158117f29fc991cbbbaaa4a47ee974f31'; + +sub rsa_sign { + my $m = '1'.('ff'x218).'003021300906052b0e03021a05000414'; + $m .= unpack 'H*', sha1(shift); + $m = Math::BigInt->from_hex($m); + my $n = Math::BigInt->from_hex($rsa_n); + my $e = Math::BigInt->from_hex($rsa_d); + $m->bmodpow($e, $n); + $m = $m->as_hex(); + $m =~ s/^0x//; + $m =~ s/^/0/ while length $m < 512; + pack 'H*', $m; +} + +sub auth_update_file { + my($dst,$seq) = (shift, shift); + my(@plt, @pcrs, @kerns, $cfg); + open my $update, '>', $dst or die $!; + for (@_) { + if (/^([0-9a-fA-F]+)=([0-9a-fA-F]+)$/) { + push @pcrs, pack 'V', hex $1; + push @plt, pack 'H*', $2; + } elsif (/^[0-9a-fA-F]{40}$/) { + push @kerns, pack 'H*', $_; + } elsif (length $_ == 20) { + push @kerns, $_; + } else { + print "Bad argument: $_"; + exit 1; + } + } + $cfg = pack 'Q>', $seq; + $cfg .= pack 'N/(a20)', @plt; + $cfg .= pack 'N/(a20)', @kerns; + + printf "cfg_hash for %s: %s\n", $dst, Digest::SHA::sha1_hex($cfg); + + print $update rsa_sign($cfg); + print $update $cfg; + print $update map { pack 'n/a3', $_ } @pcrs; + close $update; +} + +my $out = shift; +my $seq = $ENV{SEQ} || time; + +if (!$out) { + print <<EOF; +Usage: $0 <output> {<pcrs>=<composite>}* {<kernel>}* + <output> is the file that will contain the signed configuration + <pcrs> is a 24-bit PCR mask in hexadecimal + <composite> is a PCR_COMPOSITE_HASH in hexadecimal + <kernel> is a 160-bit vTPM kernel hash in hexadecimal + +The sequence number may be specified using the SEQ environment variable, +otherwise the current UNIX timestamp will be used. The sequence number of a +vTPM group must increase on each update. + +When the vTPM Manager is compiled without support for a domain builder, the +SHA-1 hash of the vTPM domain's XSM label is used in place of its kernel hash. + +Example: + A configuration with two valid command lines and one valid vTPM kernel + PCRs 0-7 and 17-19 are being validated (static RTM and TBOOT). + $0 auth-0 0e00ff=0593ecb564f532df6ef2f4d7272489da52c4c840 0e00ff=0593ecb564f532df6ef2f4d7272489da52c4c840 2bc65001d506ce6cd12cab90a4a2ad9040d641e1 +EOF + exit 0; +} +print "Sequence: $seq\n"; + +auth_update_file $out, $seq, @ARGV; diff --git a/tools/vtpmmgr/manage-vtpmmgr.pl b/tools/vtpmmgr/manage-vtpmmgr.pl new file mode 100755 index 0000000..caf4f02 --- /dev/null +++ b/tools/vtpmmgr/manage-vtpmmgr.pl @@ -0,0 +1,160 @@ +#!/usr/bin/perl +use strict; +use warnings; +use Digest::SHA; + +# The /dev/tpm0 device can only be opened by one application at a time, so if +# the trousers daemon is running, this script will fail. +system "killall tcsd 2>/dev/null"; +open my $tpm, '+>', '/dev/tpm0' or die "Could not open /dev/tpm0: $!"; + +sub tpm_cmd_raw { + my $msg = join '', @_; + my $rsp; + print '<<', unpack('H*', $msg), "\n" if $ENV{V}; + syswrite $tpm, $msg; + sysread $tpm, $rsp, 4096; + print '>>', unpack('H*', $rsp), "\n" if $ENV{V}; + $rsp; +} + +sub tpm_cmd_nohdr { + my($type, $msg) = @_; + my $head = pack 'nN', $type, 6 + length $msg; + my $rsp = tpm_cmd_raw $head, $msg; + my($rtype, $len, $stat, $reply) = unpack 'nNNa*', $rsp; + die "incomplete response" if $len != 10 + length $reply; + if ($stat) { + print "TPM error: $stat\n"; + exit 1; + } + $reply; +} + +sub cmd_list_group { + my $group = shift; + my($uuid, $pubk, $cfg_list) = unpack 'H32 a256 a*', tpm_cmd_nohdr 0x1C2, + pack 'NN', 0x02000107, $group; + $uuid = join "-", unpack 'a8a4a4a4a12', $uuid; + my $pk_hash = Digest::SHA::sha1_hex($pubk); + my $cfg_hash = Digest::SHA::sha1_hex($cfg_list); + my($seq, @cfgs) = unpack 'Q> N/(H40) a*', $cfg_list; + my @kerns = unpack "N/(H40)", pop @cfgs; + print "Group $group ($uuid):\n"; + print " Public key hash: $pk_hash\n"; + print " Boot config #$seq ($cfg_hash)\n"; + print " Platforms:\n"; + print " $_\n" for @cfgs; + print " Kernels:\n"; + print " $_\n" for @kerns; + print " VTPMs:\n"; + + my($nr, @vtpms) = unpack 'N(H32)*', tpm_cmd_nohdr 0x1C2, pack 'NNN', 0x02000201, $group, 0; + if ($nr > @vtpms) { + print " TODO this list is cropped; needs multiple requests\n"; + } + @vtpms = () if $nr == 0; # unpack returns an empty string in this case + @vtpms = map { join "-", unpack 'a8a4a4a4a12', $_ } @vtpms; + print " $_\n" for @vtpms; +} + +sub cmd_list { + if (@_) { + cmd_list_group $_[0]; + } else { + my $nr = unpack 'N', tpm_cmd_nohdr 0x1C2, pack 'N', 0x02000101; + cmd_list_group $_ for (0..($nr - 1)); + } +} + +sub cmd_group_add { + my $rsa_modfile = shift; + my $ca_digest = "\0"x20; + open MOD, $rsa_modfile or die $!; + my $group_pubkey = join '', <MOD>; + close MOD; + + my($uuid, $pubkey, $pksig) = unpack 'H32 a256 a*', tpm_cmd_nohdr 0x1C2, pack 'N(a*)*', + 0x02000102, $ca_digest, $group_pubkey; + $uuid = join "-", unpack 'a8a4a4a4a12', $uuid; + print "$uuid\n"; + mkdir "group-$uuid"; + open F, ">group-$uuid/aik.pub"; + print F $pubkey; + close F; + open F, ">group-$uuid/aik.priv-ca-data"; + print F $pksig; + close F; + + # TODO certify the AIK using the pTPM's EK (privacy CA) + # TODO escrow the recovery key for this group +} + +sub cmd_group_del { + my $nr = shift; + tpm_cmd_nohdr 0x1C2, pack 'NN', 0x02000103, $nr; +} + +sub cmd_group_update { + my $nr = shift; + open my $fh, '<', shift; + my $cmd = join '', <$fh>; + close $fh; + + tpm_cmd_nohdr 0x1C2, pack 'NNa*', 0x02000106, $nr, $cmd; +} + +sub cmd_vtpm_add { + my($group,$uuid) = @_; + if ($uuid) { + $uuid =~ s/-//g; + $uuid = pack('H32', $uuid)."\0"; + } else { + $uuid = ''; + } + $uuid = unpack 'H32', tpm_cmd_nohdr 0x1C2, pack 'NNa*', 0x02000204, $group, $uuid; + printf "%s\n", join "-", unpack 'a8a4a4a4a12', $uuid; +} + +sub cmd_vtpm_del { + my($uuid) = @_; + $uuid =~ s/-//g; + tpm_cmd_nohdr 0x1C2, pack 'NH32', 0x02000205, $uuid; +} + +sub cmd_help { + print <<EOH; +Usage: $0 <command> <args> + +list [index] + Lists the group identified by index, or all groups if omitted + +group-add rsa-modulus-file + Adds a new group to the TPM. The public key and Privacy CA data are + output to group-UUID/aik.pub and group-UUID/aik.priv-ca-data, and the + UUID is output to stdout. + +group-update index signed-config-list-file + Updates the permitted boot configuration list for an group + +group-del index + Deletes a group + +vtpm-add index + Adds a vTPM. Output: UUID + +vtpm-del UUID + Deletes a vTPM. + +EOH +} + +my $cmd = shift || 'help'; +$cmd =~ s/-/_/g; +my $fn = $main::{"cmd_$cmd"}; +if ($fn) { + $fn->(@ARGV); +} else { + print "Unknown command: $cmd\n"; + exit 1; +} -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |