22
22
from keylime import ima
23
23
from keylime import measured_boot
24
24
from keylime .common import algorithms
25
+ from keylime .failure import Failure , Component
25
26
26
27
logger = keylime_logging .init_logging ('tpm' )
27
28
@@ -204,15 +205,18 @@ def _get_tpm_rand_block(self, size=4096):
204
205
pass
205
206
206
207
def __check_ima (self , agentAttestState , pcrval , ima_measurement_list , allowlist , ima_keyring , boot_aggregates ):
208
+ failure = Failure (Component .IMA )
207
209
logger .info ("Checking IMA measurement list on agent: %s" , agentAttestState .get_agent_id ())
208
210
if config .STUB_IMA :
209
211
pcrval = None
210
- ex_value = ima .process_measurement_list (agentAttestState , ima_measurement_list .split ('\n ' ), allowlist , pcrval = pcrval , ima_keyring = ima_keyring , boot_aggregates = boot_aggregates )
211
- if ex_value is None :
212
- return False
213
212
214
- logger .debug ("IMA measurement list of agent %s validated" , agentAttestState .get_agent_id ())
215
- return True
213
+ _ , ima_failure = ima .process_measurement_list (agentAttestState , ima_measurement_list .split ('\n ' ), allowlist ,
214
+ pcrval = pcrval , ima_keyring = ima_keyring ,
215
+ boot_aggregates = boot_aggregates )
216
+ failure .merge (ima_failure )
217
+ if not failure :
218
+ logger .debug ("IMA measurement list of agent %s validated" , agentAttestState .get_agent_id ())
219
+ return failure
216
220
217
221
def __parse_pcrs (self , pcrs , virtual ) -> typing .Dict [int , str ]:
218
222
"""Parses and validates the format of a list of PCR data"""
@@ -231,8 +235,9 @@ def __parse_pcrs(self, pcrs, virtual) -> typing.Dict[int, str]:
231
235
232
236
return output
233
237
234
- def check_pcrs (self , agentAttestState , tpm_policy , pcrs , data , virtual , ima_measurement_list , allowlist , ima_keyring , mb_measurement_list , mb_refstate_str ):
235
-
238
+ def check_pcrs (self , agentAttestState , tpm_policy , pcrs , data , virtual , ima_measurement_list ,
239
+ allowlist , ima_keyring , mb_measurement_list , mb_refstate_str ) -> Failure :
240
+ failure = Failure (Component .PCR_VALIDATION )
236
241
if isinstance (tpm_policy , str ):
237
242
tpm_policy = json .loads (tpm_policy )
238
243
@@ -244,9 +249,8 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
244
249
pcr_allowlist = {int (k ): v for k , v in list (pcr_allowlist .items ())}
245
250
246
251
mb_policy , mb_refstate_data = measured_boot .get_policy (mb_refstate_str )
247
- mb_pcrs_sha256 , boot_aggregates , mb_measurement_data , success = self .parse_mb_bootlog (mb_measurement_list )
248
- if not success :
249
- return False
252
+ mb_pcrs_sha256 , boot_aggregates , mb_measurement_data , mb_failure = self .parse_mb_bootlog (mb_measurement_list )
253
+ failure .merge (mb_failure )
250
254
251
255
pcrs_in_quote = set () # PCRs in quote that were already used for some kind of validation
252
256
@@ -255,7 +259,7 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
255
259
256
260
# Skip validation if TPM is stubbed.
257
261
if config .STUB_TPM :
258
- return True
262
+ return failure
259
263
260
264
# Validate data PCR
261
265
if config .TPM_DATA_PCR in pcr_nums and data is not None :
@@ -264,47 +268,57 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
264
268
logger .error (
265
269
"%sPCR #%s: invalid bind data %s from quote does not match expected value %s" ,
266
270
("" , "v" )[virtual ], config .TPM_DATA_PCR , pcrs [config .TPM_DATA_PCR ], expectedval )
267
- return False
271
+ failure . add_event ( f"invalid_pcr_ { config . TPM_DATA_PCR } " , { "got" : pcrs [ config . TPM_DATA_PCR ], "expected" : expectedval }, True )
268
272
pcrs_in_quote .add (config .TPM_DATA_PCR )
269
273
else :
270
274
logger .error ("Binding %sPCR #%s was not included in the quote, but is required" , ("" , "v" )[virtual ],
271
275
config .TPM_DATA_PCR )
272
- return False
273
-
276
+ failure .add_event (f"missing_pcr_{ config .TPM_DATA_PCR } " , f"Data PCR { config .TPM_DATA_PCR } is missing in quote, but is required" , True )
274
277
# Check for ima PCR
275
278
if config .IMA_PCR in pcr_nums :
276
279
if ima_measurement_list is None :
277
280
logger .error ("IMA PCR in policy, but no measurement list provided" )
278
- return False
279
-
280
- if not self .__check_ima (agentAttestState , pcrs [config .IMA_PCR ], ima_measurement_list , allowlist , ima_keyring ,
281
- boot_aggregates ):
282
- return False
281
+ failure . add_event ( f"unused_pcr_ { config . IMA_PCR } " , "IMA PCR in policy, but no measurement list provided" , True )
282
+ else :
283
+ ima_failure = self .__check_ima (agentAttestState , pcrs [config .IMA_PCR ], ima_measurement_list , allowlist , ima_keyring ,
284
+ boot_aggregates )
285
+ failure . merge ( ima_failure )
283
286
284
287
pcrs_in_quote .add (config .IMA_PCR )
285
288
286
- # Handle measured boot PCRs
287
- for pcr_num in set (config .MEASUREDBOOT_PCRS ) & pcr_nums :
288
- if mb_refstate_data :
289
- if not mb_measurement_list :
290
- logger .error ("Measured Boot PCR %d in policy, but no measurement list provided" , pcr_num )
291
- return False
292
-
293
- val_from_log_int = mb_pcrs_sha256 .get (str (pcr_num ), 0 )
294
- val_from_log_hex = hex (val_from_log_int )[2 :]
295
- val_from_log_hex_stripped = val_from_log_hex .lstrip ('0' )
296
- pcrval_stripped = pcrs [pcr_num ].lstrip ('0' )
297
- if val_from_log_hex_stripped != pcrval_stripped :
298
- logger .error (
299
- "For PCR %d and hash SHA256 the boot event log has value %r but the agent returned %r" ,
300
- pcr_num , val_from_log_hex , pcrs [pcr_num ])
301
- return False
302
- if pcr_num in pcr_allowlist and pcrs [pcr_num ] not in pcr_allowlist [pcr_num ]:
303
- logger .error (
304
- "%sPCR #%s: %s from quote does not match expected value %s" ,
305
- ("" , "v" )[virtual ], pcr_num , pcrs [pcr_num ], pcr_allowlist [pcr_num ])
306
- return False
307
- pcrs_in_quote .add (pcr_num )
289
+ # Collect mismatched measured boot PCRs as measured_boot failures
290
+ mb_pcr_failure = Failure (Component .MEASURED_BOOT )
291
+ # Handle measured boot PCRs only if the parsing worked
292
+ if not mb_failure :
293
+ for pcr_num in set (config .MEASUREDBOOT_PCRS ) & pcr_nums :
294
+ if mb_refstate_data :
295
+ if not mb_measurement_list :
296
+ logger .error ("Measured Boot PCR %d in policy, but no measurement list provided" , pcr_num )
297
+ failure .add_event (f"unused_pcr_{ pcr_num } " ,
298
+ f"Measured Boot PCR { pcr_num } in policy, but no measurement list provided" , True )
299
+ continue
300
+
301
+ val_from_log_int = mb_pcrs_sha256 .get (str (pcr_num ), 0 )
302
+ val_from_log_hex = hex (val_from_log_int )[2 :]
303
+ val_from_log_hex_stripped = val_from_log_hex .lstrip ('0' )
304
+ pcrval_stripped = pcrs [pcr_num ].lstrip ('0' )
305
+ if val_from_log_hex_stripped != pcrval_stripped :
306
+ logger .error (
307
+ "For PCR %d and hash SHA256 the boot event log has value %r but the agent returned %r" ,
308
+ pcr_num , val_from_log_hex , pcrs [pcr_num ])
309
+ mb_pcr_failure .add_event (f"invalid_pcr_{ pcr_num } " ,
310
+ {"context" : "SHA256 boot event log PCR value does not match" ,
311
+ "got" : pcrs [pcr_num ], "expected" : val_from_log_hex }, True )
312
+
313
+ if pcr_num in pcr_allowlist and pcrs [pcr_num ] not in pcr_allowlist [pcr_num ]:
314
+ logger .error (
315
+ "%sPCR #%s: %s from quote does not match expected value %s" ,
316
+ ("" , "v" )[virtual ], pcr_num , pcrs [pcr_num ], pcr_allowlist [pcr_num ])
317
+ failure .add_event (f"invalid_pcr_{ pcr_num } " ,
318
+ {"context" : "PCR value is not in allowlist" ,
319
+ "got" : pcrs [pcr_num ], "expected" : pcr_allowlist [pcr_num ]}, True )
320
+ pcrs_in_quote .add (pcr_num )
321
+ failure .merge (mb_pcr_failure )
308
322
309
323
# Check the remaining non validated PCRs
310
324
for pcr_num in pcr_nums - pcrs_in_quote :
@@ -315,22 +329,23 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
315
329
if pcrs [pcr_num ] not in pcr_allowlist [pcr_num ]:
316
330
logger .error ("%sPCR #%s: %s from quote does not match expected value %s" ,
317
331
("" , "v" )[virtual ], pcr_num , pcrs [pcr_num ], pcr_allowlist [pcr_num ])
318
- return False
332
+ failure .add_event (f"invalid_pcr_{ pcr_num } " ,
333
+ {"context" : "PCR value is not in allowlist" ,
334
+ "got" : pcrs [pcr_num ], "expected" : pcr_allowlist [pcr_num ]}, True )
319
335
320
336
pcrs_in_quote .add (pcr_num )
321
337
322
338
missing = set (pcr_allowlist .keys ()) - pcrs_in_quote
323
339
if len (missing ) > 0 :
324
340
logger .error ("%sPCRs specified in policy not in quote: %s" , ("" , "v" )[virtual ], missing )
325
- return False
341
+ failure . add_event ( "missing_pcrs" , { "context" : "PCRs are missing in quote" , "data" : missing }, True )
326
342
327
- if mb_refstate_data :
328
- success = measured_boot .evaluate_policy (mb_policy , mb_refstate_data , mb_measurement_data ,
343
+ if not mb_failure and mb_refstate_data :
344
+ mb_policy_failure = measured_boot .evaluate_policy (mb_policy , mb_refstate_data , mb_measurement_data ,
329
345
pcrs_in_quote , ("" , "v" )[virtual ], agentAttestState .get_agent_id ())
330
- if not success :
331
- return False
346
+ failure .merge (mb_policy_failure )
332
347
333
- return True
348
+ return failure
334
349
335
350
# tpm_nvram
336
351
@abstractmethod
0 commit comments