Skip to content

Commit dd212a6

Browse files
committed
pcr validation: move to new failure architecture
Part of enhancement proposal keylime/enhancements#48 Signed-off-by: Thore Sommer <[email protected]>
1 parent 44d08b3 commit dd212a6

File tree

4 files changed

+91
-63
lines changed

4 files changed

+91
-63
lines changed

keylime/tenant.py

+2-1
Original file line numberDiff line numberDiff line change
@@ -507,7 +507,8 @@ def validate_tpm_quote(self, public_key, quote, hash_alg):
507507
logger.warning("AIK not found in registrar, quote not validated")
508508
return False
509509

510-
if not self.tpm_instance.check_quote(AgentAttestState(self.agent_uuid), self.nonce, public_key, quote, reg_data['aik_tpm'], hash_alg=hash_alg):
510+
failure = self.tpm_instance.check_quote(AgentAttestState(self.agent_uuid), self.nonce, public_key, quote, reg_data['aik_tpm'], hash_alg=hash_alg)
511+
if failure:
511512
if reg_data['regcount'] > 1:
512513
logger.error("WARNING: This UUID had more than one ek-ekcert registered to it! This might indicate that your system is misconfigured or a malicious host is present. Run 'regdelete' for this agent and restart")
513514
sys.exit()

keylime/tpm/tpm_abstract.py

+63-48
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@
2222
from keylime import ima
2323
from keylime import measured_boot
2424
from keylime.common import algorithms
25+
from keylime.failure import Failure, Component
2526

2627
logger = keylime_logging.init_logging('tpm')
2728

@@ -204,15 +205,18 @@ def _get_tpm_rand_block(self, size=4096):
204205
pass
205206

206207
def __check_ima(self, agentAttestState, pcrval, ima_measurement_list, allowlist, ima_keyring, boot_aggregates):
208+
failure = Failure(Component.IMA)
207209
logger.info("Checking IMA measurement list on agent: %s", agentAttestState.get_agent_id())
208210
if config.STUB_IMA:
209211
pcrval = None
210-
ex_value = ima.process_measurement_list(agentAttestState, ima_measurement_list.split('\n'), allowlist, pcrval=pcrval, ima_keyring=ima_keyring, boot_aggregates=boot_aggregates)
211-
if ex_value is None:
212-
return False
213212

214-
logger.debug("IMA measurement list of agent %s validated", agentAttestState.get_agent_id())
215-
return True
213+
_, ima_failure = ima.process_measurement_list(agentAttestState, ima_measurement_list.split('\n'), allowlist,
214+
pcrval=pcrval, ima_keyring=ima_keyring,
215+
boot_aggregates=boot_aggregates)
216+
failure.merge(ima_failure)
217+
if not failure:
218+
logger.debug("IMA measurement list of agent %s validated", agentAttestState.get_agent_id())
219+
return failure
216220

217221
def __parse_pcrs(self, pcrs, virtual) -> typing.Dict[int, str]:
218222
"""Parses and validates the format of a list of PCR data"""
@@ -231,8 +235,9 @@ def __parse_pcrs(self, pcrs, virtual) -> typing.Dict[int, str]:
231235

232236
return output
233237

234-
def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_measurement_list, allowlist, ima_keyring, mb_measurement_list, mb_refstate_str):
235-
238+
def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_measurement_list,
239+
allowlist, ima_keyring, mb_measurement_list, mb_refstate_str) -> Failure:
240+
failure = Failure(Component.PCR_VALIDATION)
236241
if isinstance(tpm_policy, str):
237242
tpm_policy = json.loads(tpm_policy)
238243

@@ -244,9 +249,8 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
244249
pcr_allowlist = {int(k): v for k, v in list(pcr_allowlist.items())}
245250

246251
mb_policy, mb_refstate_data = measured_boot.get_policy(mb_refstate_str)
247-
mb_pcrs_sha256, boot_aggregates, mb_measurement_data, success = self.parse_mb_bootlog(mb_measurement_list)
248-
if not success:
249-
return False
252+
mb_pcrs_sha256, boot_aggregates, mb_measurement_data, mb_failure = self.parse_mb_bootlog(mb_measurement_list)
253+
failure.merge(mb_failure)
250254

251255
pcrs_in_quote = set() # PCRs in quote that were already used for some kind of validation
252256

@@ -255,7 +259,7 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
255259

256260
# Skip validation if TPM is stubbed.
257261
if config.STUB_TPM:
258-
return True
262+
return failure
259263

260264
# Validate data PCR
261265
if config.TPM_DATA_PCR in pcr_nums and data is not None:
@@ -264,47 +268,57 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
264268
logger.error(
265269
"%sPCR #%s: invalid bind data %s from quote does not match expected value %s",
266270
("", "v")[virtual], config.TPM_DATA_PCR, pcrs[config.TPM_DATA_PCR], expectedval)
267-
return False
271+
failure.add_event(f"invalid_pcr_{config.TPM_DATA_PCR}", {"got": pcrs[config.TPM_DATA_PCR], "expected": expectedval}, True)
268272
pcrs_in_quote.add(config.TPM_DATA_PCR)
269273
else:
270274
logger.error("Binding %sPCR #%s was not included in the quote, but is required", ("", "v")[virtual],
271275
config.TPM_DATA_PCR)
272-
return False
273-
276+
failure.add_event(f"missing_pcr_{config.TPM_DATA_PCR}", f"Data PCR {config.TPM_DATA_PCR} is missing in quote, but is required", True)
274277
# Check for ima PCR
275278
if config.IMA_PCR in pcr_nums:
276279
if ima_measurement_list is None:
277280
logger.error("IMA PCR in policy, but no measurement list provided")
278-
return False
279-
280-
if not self.__check_ima(agentAttestState, pcrs[config.IMA_PCR], ima_measurement_list, allowlist, ima_keyring,
281-
boot_aggregates):
282-
return False
281+
failure.add_event(f"unused_pcr_{config.IMA_PCR}", "IMA PCR in policy, but no measurement list provided", True)
282+
else:
283+
ima_failure = self.__check_ima(agentAttestState, pcrs[config.IMA_PCR], ima_measurement_list, allowlist, ima_keyring,
284+
boot_aggregates)
285+
failure.merge(ima_failure)
283286

284287
pcrs_in_quote.add(config.IMA_PCR)
285288

286-
# Handle measured boot PCRs
287-
for pcr_num in set(config.MEASUREDBOOT_PCRS) & pcr_nums:
288-
if mb_refstate_data:
289-
if not mb_measurement_list:
290-
logger.error("Measured Boot PCR %d in policy, but no measurement list provided", pcr_num)
291-
return False
292-
293-
val_from_log_int = mb_pcrs_sha256.get(str(pcr_num), 0)
294-
val_from_log_hex = hex(val_from_log_int)[2:]
295-
val_from_log_hex_stripped = val_from_log_hex.lstrip('0')
296-
pcrval_stripped = pcrs[pcr_num].lstrip('0')
297-
if val_from_log_hex_stripped != pcrval_stripped:
298-
logger.error(
299-
"For PCR %d and hash SHA256 the boot event log has value %r but the agent returned %r",
300-
pcr_num, val_from_log_hex, pcrs[pcr_num])
301-
return False
302-
if pcr_num in pcr_allowlist and pcrs[pcr_num] not in pcr_allowlist[pcr_num]:
303-
logger.error(
304-
"%sPCR #%s: %s from quote does not match expected value %s",
305-
("", "v")[virtual], pcr_num, pcrs[pcr_num], pcr_allowlist[pcr_num])
306-
return False
307-
pcrs_in_quote.add(pcr_num)
289+
# Collect mismatched measured boot PCRs as measured_boot failures
290+
mb_pcr_failure = Failure(Component.MEASURED_BOOT)
291+
# Handle measured boot PCRs only if the parsing worked
292+
if not mb_failure:
293+
for pcr_num in set(config.MEASUREDBOOT_PCRS) & pcr_nums:
294+
if mb_refstate_data:
295+
if not mb_measurement_list:
296+
logger.error("Measured Boot PCR %d in policy, but no measurement list provided", pcr_num)
297+
failure.add_event(f"unused_pcr_{pcr_num}",
298+
f"Measured Boot PCR {pcr_num} in policy, but no measurement list provided", True)
299+
continue
300+
301+
val_from_log_int = mb_pcrs_sha256.get(str(pcr_num), 0)
302+
val_from_log_hex = hex(val_from_log_int)[2:]
303+
val_from_log_hex_stripped = val_from_log_hex.lstrip('0')
304+
pcrval_stripped = pcrs[pcr_num].lstrip('0')
305+
if val_from_log_hex_stripped != pcrval_stripped:
306+
logger.error(
307+
"For PCR %d and hash SHA256 the boot event log has value %r but the agent returned %r",
308+
pcr_num, val_from_log_hex, pcrs[pcr_num])
309+
mb_pcr_failure.add_event(f"invalid_pcr_{pcr_num}",
310+
{"context": "SHA256 boot event log PCR value does not match",
311+
"got": pcrs[pcr_num], "expected": val_from_log_hex}, True)
312+
313+
if pcr_num in pcr_allowlist and pcrs[pcr_num] not in pcr_allowlist[pcr_num]:
314+
logger.error(
315+
"%sPCR #%s: %s from quote does not match expected value %s",
316+
("", "v")[virtual], pcr_num, pcrs[pcr_num], pcr_allowlist[pcr_num])
317+
failure.add_event(f"invalid_pcr_{pcr_num}",
318+
{"context": "PCR value is not in allowlist",
319+
"got": pcrs[pcr_num], "expected": pcr_allowlist[pcr_num]}, True)
320+
pcrs_in_quote.add(pcr_num)
321+
failure.merge(mb_pcr_failure)
308322

309323
# Check the remaining non validated PCRs
310324
for pcr_num in pcr_nums - pcrs_in_quote:
@@ -315,22 +329,23 @@ def check_pcrs(self, agentAttestState, tpm_policy, pcrs, data, virtual, ima_meas
315329
if pcrs[pcr_num] not in pcr_allowlist[pcr_num]:
316330
logger.error("%sPCR #%s: %s from quote does not match expected value %s",
317331
("", "v")[virtual], pcr_num, pcrs[pcr_num], pcr_allowlist[pcr_num])
318-
return False
332+
failure.add_event(f"invalid_pcr_{pcr_num}",
333+
{"context": "PCR value is not in allowlist",
334+
"got": pcrs[pcr_num], "expected": pcr_allowlist[pcr_num]}, True)
319335

320336
pcrs_in_quote.add(pcr_num)
321337

322338
missing = set(pcr_allowlist.keys()) - pcrs_in_quote
323339
if len(missing) > 0:
324340
logger.error("%sPCRs specified in policy not in quote: %s", ("", "v")[virtual], missing)
325-
return False
341+
failure.add_event("missing_pcrs", {"context": "PCRs are missing in quote", "data": missing}, True)
326342

327-
if mb_refstate_data:
328-
success = measured_boot.evaluate_policy(mb_policy, mb_refstate_data, mb_measurement_data,
343+
if not mb_failure and mb_refstate_data:
344+
mb_policy_failure = measured_boot.evaluate_policy(mb_policy, mb_refstate_data, mb_measurement_data,
329345
pcrs_in_quote, ("", "v")[virtual], agentAttestState.get_agent_id())
330-
if not success:
331-
return False
346+
failure.merge(mb_policy_failure)
332347

333-
return True
348+
return failure
334349

335350
# tpm_nvram
336351
@abstractmethod

keylime/tpm/tpm_main.py

+21-9
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111
import tempfile
1212
import threading
1313
import time
14+
import typing
1415
import zlib
1516
import codecs
1617
from distutils.version import StrictVersion
@@ -31,6 +32,7 @@
3132
from keylime import tpm_ek_ca
3233
from keylime.common import algorithms
3334
from keylime.tpm import tpm2_objects
35+
from keylime.failure import Failure, Component
3436

3537
logger = keylime_logging.init_logging('tpm')
3638

@@ -1090,13 +1092,18 @@ def _tpm2_checkquote(self, aikTpmFromRegistrar, quote, nonce, hash_alg):
10901092

10911093
return retout, True
10921094

1093-
def check_quote(self, agentAttestState, nonce, data, quote, aikTpmFromRegistrar, tpm_policy={}, ima_measurement_list=None, allowlist={}, hash_alg=None, ima_keyring=None, mb_measurement_list=None, mb_refstate=None):
1095+
def check_quote(self, agentAttestState, nonce, data, quote, aikTpmFromRegistrar, tpm_policy={},
1096+
ima_measurement_list=None, allowlist={}, hash_alg=None, ima_keyring=None,
1097+
mb_measurement_list=None, mb_refstate=None) -> Failure:
1098+
failure = Failure(Component.QUOTE_VALIDATION)
10941099
if hash_alg is None:
10951100
hash_alg = self.defaults['hash']
10961101

10971102
retout, success = self._tpm2_checkquote(aikTpmFromRegistrar, quote, nonce, hash_alg)
10981103
if not success:
1099-
return success
1104+
# If the quote validation fails we will skip all other steps therefore this failure is irrecoverable.
1105+
failure.add_event("quote_validation", {"message": "Quote validation using tpm2-tools", "data": retout}, False)
1106+
return failure
11001107

11011108
pcrs = []
11021109
jsonout = config.yaml_to_dict(retout)
@@ -1340,30 +1347,35 @@ def _parse_mb_bootlog(self, log_b64:str) -> dict:
13401347
log_bin = base64.b64decode(log_b64, validate=True)
13411348
return self.parse_binary_bootlog(log_bin)
13421349

1343-
def parse_mb_bootlog(self, mb_measurement_list:str) -> dict:
1350+
def parse_mb_bootlog(self, mb_measurement_list: str) -> typing.Tuple[dict, typing.Optional[dict], dict, Failure]:
13441351
""" Parse the measured boot log and return its object and the state of the SHA256 PCRs
13451352
:param mb_measurement_list: The measured boot measurement list
13461353
:returns: Returns a map of the state of the SHA256 PCRs, measured boot data object and True for success
13471354
and False in case an error occurred
13481355
"""
1356+
failure = Failure(Component.MEASURED_BOOT, ["parser"])
13491357
if mb_measurement_list:
1358+
#TODO add tagging for _parse_mb_bootlog
13501359
mb_measurement_data = self._parse_mb_bootlog(mb_measurement_list)
13511360
if not mb_measurement_data:
13521361
logger.error("Unable to parse measured boot event log. Check previous messages for a reason for error.")
1353-
return {}, None, {}, False
1362+
return {}, None, {}, failure
13541363
log_pcrs = mb_measurement_data.get('pcrs')
13551364
if not isinstance(log_pcrs, dict):
13561365
logger.error("Parse of measured boot event log has unexpected value for .pcrs: %r", log_pcrs)
1357-
return {}, None, {}, False
1366+
failure.add_event("invalid_pcrs", {"got": log_pcrs}, True)
1367+
return {}, None, {}, failure
13581368
pcrs_sha256 = log_pcrs.get('sha256')
13591369
if (not isinstance(pcrs_sha256, dict)) or not pcrs_sha256:
13601370
logger.error("Parse of measured boot event log has unexpected value for .pcrs.sha256: %r", pcrs_sha256)
1361-
return {}, None, {}, False
1371+
failure.add_event("invalid_pcrs_sha256", {"got": pcrs_sha256}, True)
1372+
return {}, None, {}, failure
13621373
boot_aggregates = mb_measurement_data.get('boot_aggregates')
13631374
if (not isinstance(boot_aggregates, dict)) or not boot_aggregates:
13641375
logger.error("Parse of measured boot event log has unexpected value for .boot_aggragtes: %r", boot_aggregates)
1365-
return {}, None, {}, False
1376+
failure.add_event("invalid_boot_aggregates", {"got": boot_aggregates}, True)
1377+
return {}, None, {}, failure
13661378

1367-
return pcrs_sha256, boot_aggregates, mb_measurement_data, True
1379+
return pcrs_sha256, boot_aggregates, mb_measurement_data, failure
13681380

1369-
return {}, None, {}, True
1381+
return {}, None, {}, failure

test/test_restful.py

+5-5
Original file line numberDiff line numberDiff line change
@@ -557,13 +557,13 @@ def test_022_agent_quotes_identity_get(self):
557557
self.assertIn("pubkey", json_response["results"], "Malformed response body!")
558558

559559
# Check the quote identity
560-
self.assertTrue(tpm_instance.check_quote(tenant_templ.agent_uuid,
560+
failure = tpm_instance.check_quote(tenant_templ.agent_uuid,
561561
nonce,
562562
json_response["results"]["pubkey"],
563563
json_response["results"]["quote"],
564564
aik_tpm,
565-
hash_alg=json_response["results"]["hash_alg"]),
566-
"Invalid quote!")
565+
hash_alg=json_response["results"]["hash_alg"])
566+
self.assertTrue(not failure, "Invalid quote!")
567567

568568
@unittest.skip("Testing of agent's POST /keys/vkey disabled! (spawned CV should do this already)")
569569
def test_023_agent_keys_vkey_post(self):
@@ -846,14 +846,14 @@ def test_040_agent_quotes_integrity_get(self):
846846
quote = json_response["results"]["quote"]
847847
hash_alg = json_response["results"]["hash_alg"]
848848

849-
validQuote = tpm_instance.check_quote(tenant_templ.agent_uuid,
849+
failure = tpm_instance.check_quote(tenant_templ.agent_uuid,
850850
nonce,
851851
public_key,
852852
quote,
853853
aik_tpm,
854854
self.tpm_policy,
855855
hash_alg=hash_alg)
856-
self.assertTrue(validQuote)
856+
self.assertTrue(not failure)
857857

858858
async def test_041_agent_keys_verify_get(self):
859859
"""Test agent's GET /keys/verify Interface

0 commit comments

Comments
 (0)