On Fri, Aug 16, 2024 at 6:58 PM Daniel P. Berrangé <berra...@redhat.com> wrote: > > On Fri, Aug 16, 2024 at 06:50:34PM +0600, Dorjoy Chowdhury wrote: > > Hi Daniel, > > > > On Mon, Aug 12, 2024 at 8:07 PM Daniel P. Berrangé <berra...@redhat.com> > > wrote: > > > > > > On Sat, Aug 10, 2024 at 10:45:01PM +0600, Dorjoy Chowdhury wrote: > > > > AWS Nitro Enclaves have built-in Nitro Secure Module (NSM) device which > > > > is used for stripped down TPM functionality like attestation. This > > > > commit > > > > adds the built-in NSM device in the nitro-enclave machine type. > > > > > > > > In Nitro Enclaves, all the PCRs start in a known zero state and the > > > > first > > > > 16 PCRs are locked from boot and reserved. The PCR0, PCR1, PCR2 and PCR8 > > > > contain the SHA384 hashes related to the EIF file used to boot the > > > > VM for validation. > > > > > > > > A new optional nitro-enclave machine option 'id' has been added which > > > > will > > > > be the enclave identifier reflected in the module-id of the NSM device. > > > > Otherwise, the device will have a default id set. > > > > > > > > Signed-off-by: Dorjoy Chowdhury <dorjoychy...@gmail.com> > > > > --- > > > > hw/core/eif.c | 205 +++++++++++++++++++++++++++++++- > > > > hw/core/eif.h | 5 +- > > > > hw/core/meson.build | 4 +- > > > > hw/i386/Kconfig | 1 + > > > > hw/i386/nitro_enclave.c | 85 ++++++++++++- > > > > include/hw/i386/nitro_enclave.h | 19 +++ > > > > 6 files changed, 310 insertions(+), 9 deletions(-) > > > > > > > > diff --git a/hw/core/eif.c b/hw/core/eif.c > > > > index 5558879a96..d2c65668ef 100644 > > > > --- a/hw/core/eif.c > > > > +++ b/hw/core/eif.c > > > > @@ -12,6 +12,9 @@ > > > > #include "qemu/bswap.h" > > > > #include "qapi/error.h" > > > > #include <zlib.h> /* for crc32 */ > > > > +#include <cbor.h> > > > > +#include <gnutls/gnutls.h> > > > > +#include <gnutls/x509.h> > > > > > > > > #include "hw/core/eif.h" > > > > > > > > > > > @@ -269,6 +284,125 @@ static bool read_eif_ramdisk(FILE *eif, FILE > > > > *initrd, uint64_t size, > > > > return false; > > > > } > > > > > > > > +static bool get_fingerprint_sha384_from_cert(uint8_t *cert, size_t > > > > size, > > > > + uint8_t *sha384, Error > > > > **errp) > > > > +{ > > > > + gnutls_x509_crt_t crt; > > > > + size_t hash_size = 48; > > > > + gnutls_datum_t datum = {.data = cert, .size = size}; > > > > + > > > > + gnutls_global_init(); > > > > + gnutls_x509_crt_init(&crt); > > > > + > > > > + if (gnutls_x509_crt_import(crt, &datum, GNUTLS_X509_FMT_PEM) != 0) > > > > { > > > > + error_setg(errp, "Failed to import certificate"); > > > > + goto cleanup; > > > > + } > > > > + > > > > + if (gnutls_x509_crt_get_fingerprint(crt, GNUTLS_DIG_SHA384, sha384, > > > > + &hash_size) != 0) { > > > > + error_setg(errp, "Failed to compute SHA384 fingerprint"); > > > > + goto cleanup; > > > > + } > > > > + > > > > + return true; > > > > + > > > > + cleanup: > > > > + gnutls_x509_crt_deinit(crt); > > > > + gnutls_global_deinit(); > > > > + return false; > > > > +} > > > > > > I'd suggest this go into qcrypto/x509-utils.c & > > > include/qcrypto/x509-utils.h, > > > as: > > > > > > int qcrypto_get_x509_cert_fingerprint(uint8_t *cert, > > > size_t size, > > > QCryptoHashAlgorith hash, > > > Error **errp); > > > > > > there's no need to be calling gnutls_global_init() / deinit() either. > > > > > > > > > > @@ -299,7 +433,9 @@ static long get_file_size(FILE *f, Error **errp) > > > > */ > > > > bool read_eif_file(const char *eif_path, const char *machine_initrd, > > > > char **kernel_path, char **initrd_path, char > > > > **cmdline, > > > > - Error **errp) > > > > + uint8_t *image_sha384, uint8_t *bootstrap_sha384, > > > > + uint8_t *app_sha384, uint8_t *fingerprint_sha384, > > > > + bool *signature_found, Error **errp) > > > > { > > > > FILE *f = NULL; > > > > FILE *machine_initrd_f = NULL; > > > > @@ -308,9 +444,33 @@ bool read_eif_file(const char *eif_path, const > > > > char *machine_initrd, > > > > uint32_t crc = 0; > > > > EifHeader eif_header; > > > > bool seen_sections[EIF_SECTION_MAX] = {false}; > > > > - > > > > + /* kernel + ramdisks + cmdline sha384 hash */ > > > > + GChecksum *image_hasher = NULL; > > > > + /* kernel + boot ramdisk + cmdline sha384 hash */ > > > > + GChecksum *bootstrap_hasher = NULL; > > > > + /* application ramdisk(s) hash */ > > > > + GChecksum *app_hasher = NULL; > > > > + size_t digest_len; > > > > + > > > > + *signature_found = false; > > > > *kernel_path = *initrd_path = *cmdline = NULL; > > > > > > > > + image_hasher = g_checksum_new(G_CHECKSUM_SHA384); > > > > + if (image_hasher == NULL) { > > > > + error_setg(errp, "Failed to initialize sha384 hash for image"); > > > > + goto cleanup; > > > > + } > > > > + bootstrap_hasher = g_checksum_new(G_CHECKSUM_SHA384); > > > > + if (bootstrap_hasher == NULL) { > > > > + error_setg(errp, "Failed to initialize sha384 hash for > > > > bootstrap"); > > > > + goto cleanup; > > > > + } > > > > + app_hasher = g_checksum_new(G_CHECKSUM_SHA384); > > > > + if (app_hasher == NULL) { > > > > + error_setg(errp, "Failed to initialize sha384 hash for app"); > > > > + goto cleanup; > > > > + } > > > > > > Don't use GChecksum APIs please, use the qcrypto hash APIs instead, > > > as we need all code to be using the designated QEMU crypto backend. > > > > > > > Thanks for the reviews. I was looking into replacing the GChecksum > > uses with qcrypto apis and was able to do it in the extendPCR function > > but I need some help with how I can do this in the eif.c file. For > > example, the "image_hash" needs to be a SHA384 hash of the kernel, > > cmdline, ramdisks sections' data as they appear in the order that is > > in the EIF file. Using GChecksum it was easy as I was able to just > > pass the hashers to the "read_eif_kernel", "read_eif_ramdisk" etc > > functions and call "update" on them. But the qcrypto apis are > > stateless i.e., I would need to pass all the buffers in a single api > > call so it wouldn't work right now out of the box. Do you have any > > suggestions how I should modify/create qcrypto apis so that I can > > easily do this (considering that I would need to implement for > > different qcrypto backends)? Thanks! > > Looking at the read_eif_* methods: > > @ -213,6 +218,8 @@ static bool read_eif_kernel(FILE *f, uint64_t size, char > **kernel_path, > } > > *crc = crc32(*crc, kernel, size); > + g_checksum_update(image_hasher, kernel, size); > + g_checksum_update(bootstrap_hasher, kernel, size); > g_free(kernel); > fclose(tmp_file); > > @@ -230,6 +237,8 @@ static bool read_eif_kernel(FILE *f, uint64_t size, char > **kernel_path, > } > > static bool read_eif_cmdline(FILE *f, uint64_t size, char *cmdline, > + GChecksum *image_hasher, > + GChecksum *bootstrap_hasher, > uint32_t *crc, Error **errp) > { > size_t got = fread(cmdline, 1, size, f); > @@ -239,10 +248,14 @@ static bool read_eif_cmdline(FILE *f, uint64_t size, > char *cmdline, > } > > *crc = crc32(*crc, (uint8_t *)cmdline, size); > + g_checksum_update(image_hasher, (uint8_t *)cmdline, size); > + g_checksum_update(bootstrap_hasher, (uint8_t *)cmdline, size); > return true; > } > > static bool read_eif_ramdisk(FILE *eif, FILE *initrd, uint64_t size, > + GChecksum *image_hasher, > + GChecksum *bootstrap_or_app_hasher, > uint32_t *crc, Error **errp) > { > size_t got; > @@ -261,6 +274,8 @@ static bool read_eif_ramdisk(FILE *eif, FILE *initrd, > uint64_t size, > } > > *crc = crc32(*crc, ramdisk, size); > + g_checksum_update(image_hasher, ramdisk, size); > + g_checksum_update(bootstrap_or_app_hasher, ramdisk, size); > g_free(ramdisk); > return true; > > > For the kernel + ramdisk, these methods are freeing the buffer. > For the cmdline, the pointer is held by the caller. > > I'd suggest that read_eif_kernel+ramddisk are changed to return > the data pointer instead of free'ing it. > > The caller can then stash the kernl+cmdline+ramdisk into an iovec > and calc the hash in a single stateless operation. > > > > If you really don't want to do that, then you'll have to wait for > this series to be finalized & merged next dev cycle: > > https://lists.nongnu.org/archive/html/qemu-devel/2024-08/msg01173.html > > It is getting close to ready, so might not be too long, but I can't > guarantee a timeframe. >
Thanks Daniel! It looks like returning the buffers is the way to move forward for now. Regards, Dorjoy