mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-19 10:53:58 +00:00
b0fefb25c5
The current approach of injecting manifest into mac_veriexec is to verify the integrity of it in userspace (veriexec (8)) and pass its entries into kernel using a char device (/dev/veriexec). This requires verifying root partition integrity in loader, for example by using memory disk and checking its hash. Otherwise if rootfs is compromised an attacker could inject their own data. This patch introduces an option to parse manifest in kernel based on envs. The loader sets manifest path and digest. EVENTHANDLER is used to launch the module right after the rootfs is mounted. It has to be done this way, since one might want to verify integrity of the init file. This means that manifest is required to be present on the root partition. Note that the envs have to be set right before boot to make sure that no one can spoof them. Submitted by: Kornel Duleba <mindal@semihalf.com> Reviewed by: sjg Obtained from: Semihalf Sponsored by: Stormshield Differential Revision: https://reviews.freebsd.org/D19281
52 lines
2.2 KiB
C
52 lines
2.2 KiB
C
/*-
|
|
* Copyright (c) 2017-2018, Juniper Networks, Inc.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
#ifndef _VERIFY_FILE_H_
|
|
#define _VERIFY_FILE_H_
|
|
|
|
#define VE_GUESS -1 /* let verify_file work it out */
|
|
#define VE_TRY 0 /* we don't mind if unverified */
|
|
#define VE_WANT 1 /* we want this verified */
|
|
#define VE_MUST 2 /* this must be verified */
|
|
|
|
#define VE_NOT_CHECKED -42
|
|
#define VE_VERIFIED 1 /* all good */
|
|
#define VE_UNVERIFIED_OK 0 /* not verified but that's ok */
|
|
#define VE_NOT_VERIFYING 2 /* we are not verifying */
|
|
|
|
struct stat;
|
|
|
|
void ve_debug_set(int);
|
|
int ve_status_get(int);
|
|
void ve_efi_init(void);
|
|
int load_manifest(const char *, const char *, const char *, struct stat *);
|
|
int pass_manifest(const char *, const char *);
|
|
int pass_manifest_export_envs(void);
|
|
int verify_file(int, const char *, off_t, int);
|
|
void verify_pcr_export(void);
|
|
|
|
#endif /* _VERIFY_FILE_H_ */
|