Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
torvalds
GitHub Repository: torvalds/linux
Path: blob/master/fs/afs/cm_security.c
26278 views
1
// SPDX-License-Identifier: GPL-2.0-or-later
2
/* Cache manager security.
3
*
4
* Copyright (C) 2025 Red Hat, Inc. All Rights Reserved.
5
* Written by David Howells ([email protected])
6
*/
7
8
#include <linux/slab.h>
9
#include <crypto/krb5.h>
10
#include "internal.h"
11
#include "afs_cm.h"
12
#include "afs_fs.h"
13
#include "protocol_yfs.h"
14
#define RXRPC_TRACE_ONLY_DEFINE_ENUMS
15
#include <trace/events/rxrpc.h>
16
17
#define RXGK_SERVER_ENC_TOKEN 1036U // 0x40c
18
#define xdr_round_up(x) (round_up((x), sizeof(__be32)))
19
#define xdr_len_object(x) (4 + round_up((x), sizeof(__be32)))
20
21
#ifdef CONFIG_RXGK
22
static int afs_create_yfs_cm_token(struct sk_buff *challenge,
23
struct afs_server *server);
24
#endif
25
26
/*
27
* Respond to an RxGK challenge, adding appdata.
28
*/
29
static int afs_respond_to_challenge(struct sk_buff *challenge)
30
{
31
#ifdef CONFIG_RXGK
32
struct krb5_buffer appdata = {};
33
struct afs_server *server;
34
#endif
35
struct rxrpc_peer *peer;
36
unsigned long peer_data;
37
u16 service_id;
38
u8 security_index;
39
40
rxrpc_kernel_query_challenge(challenge, &peer, &peer_data,
41
&service_id, &security_index);
42
43
_enter("%u,%u", service_id, security_index);
44
45
switch (service_id) {
46
/* We don't send CM_SERVICE RPCs, so don't expect a challenge
47
* therefrom.
48
*/
49
case FS_SERVICE:
50
case VL_SERVICE:
51
case YFS_FS_SERVICE:
52
case YFS_VL_SERVICE:
53
break;
54
default:
55
pr_warn("Can't respond to unknown challenge %u:%u",
56
service_id, security_index);
57
return rxrpc_kernel_reject_challenge(challenge, RX_USER_ABORT, -EPROTO,
58
afs_abort_unsupported_sec_class);
59
}
60
61
switch (security_index) {
62
#ifdef CONFIG_RXKAD
63
case RXRPC_SECURITY_RXKAD:
64
return rxkad_kernel_respond_to_challenge(challenge);
65
#endif
66
67
#ifdef CONFIG_RXGK
68
case RXRPC_SECURITY_RXGK:
69
return rxgk_kernel_respond_to_challenge(challenge, &appdata);
70
71
case RXRPC_SECURITY_YFS_RXGK:
72
switch (service_id) {
73
case FS_SERVICE:
74
case YFS_FS_SERVICE:
75
server = (struct afs_server *)peer_data;
76
if (!server->cm_rxgk_appdata.data) {
77
mutex_lock(&server->cm_token_lock);
78
if (!server->cm_rxgk_appdata.data)
79
afs_create_yfs_cm_token(challenge, server);
80
mutex_unlock(&server->cm_token_lock);
81
}
82
if (server->cm_rxgk_appdata.data)
83
appdata = server->cm_rxgk_appdata;
84
break;
85
}
86
return rxgk_kernel_respond_to_challenge(challenge, &appdata);
87
#endif
88
89
default:
90
return rxrpc_kernel_reject_challenge(challenge, RX_USER_ABORT, -EPROTO,
91
afs_abort_unsupported_sec_class);
92
}
93
}
94
95
/*
96
* Process the OOB message queue, processing challenge packets.
97
*/
98
void afs_process_oob_queue(struct work_struct *work)
99
{
100
struct afs_net *net = container_of(work, struct afs_net, rx_oob_work);
101
struct sk_buff *oob;
102
enum rxrpc_oob_type type;
103
104
while ((oob = rxrpc_kernel_dequeue_oob(net->socket, &type))) {
105
switch (type) {
106
case RXRPC_OOB_CHALLENGE:
107
afs_respond_to_challenge(oob);
108
break;
109
}
110
rxrpc_kernel_free_oob(oob);
111
}
112
}
113
114
#ifdef CONFIG_RXGK
115
/*
116
* Create a securities keyring for the cache manager and attach a key to it for
117
* the RxGK tokens we want to use to secure the callback connection back from
118
* the fileserver.
119
*/
120
int afs_create_token_key(struct afs_net *net, struct socket *socket)
121
{
122
const struct krb5_enctype *krb5;
123
struct key *ring;
124
key_ref_t key;
125
char K0[32], *desc;
126
int ret;
127
128
ring = keyring_alloc("kafs",
129
GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(),
130
KEY_POS_SEARCH | KEY_POS_WRITE |
131
KEY_USR_VIEW | KEY_USR_READ | KEY_USR_SEARCH,
132
KEY_ALLOC_NOT_IN_QUOTA,
133
NULL, NULL);
134
if (IS_ERR(ring))
135
return PTR_ERR(ring);
136
137
ret = rxrpc_sock_set_security_keyring(socket->sk, ring);
138
if (ret < 0)
139
goto out;
140
141
ret = -ENOPKG;
142
krb5 = crypto_krb5_find_enctype(KRB5_ENCTYPE_AES128_CTS_HMAC_SHA1_96);
143
if (!krb5)
144
goto out;
145
146
if (WARN_ON_ONCE(krb5->key_len > sizeof(K0)))
147
goto out;
148
149
ret = -ENOMEM;
150
desc = kasprintf(GFP_KERNEL, "%u:%u:%u:%u",
151
YFS_CM_SERVICE, RXRPC_SECURITY_YFS_RXGK, 1, krb5->etype);
152
if (!desc)
153
goto out;
154
155
wait_for_random_bytes();
156
get_random_bytes(K0, krb5->key_len);
157
158
key = key_create(make_key_ref(ring, true),
159
"rxrpc_s", desc,
160
K0, krb5->key_len,
161
KEY_POS_VIEW | KEY_POS_READ | KEY_POS_SEARCH | KEY_USR_VIEW,
162
KEY_ALLOC_NOT_IN_QUOTA);
163
kfree(desc);
164
if (IS_ERR(key)) {
165
ret = PTR_ERR(key);
166
goto out;
167
}
168
169
net->fs_cm_token_key = key_ref_to_ptr(key);
170
ret = 0;
171
out:
172
key_put(ring);
173
return ret;
174
}
175
176
/*
177
* Create an YFS RxGK GSS token to use as a ticket to the specified fileserver.
178
*/
179
static int afs_create_yfs_cm_token(struct sk_buff *challenge,
180
struct afs_server *server)
181
{
182
const struct krb5_enctype *conn_krb5, *token_krb5;
183
const struct krb5_buffer *token_key;
184
struct crypto_aead *aead;
185
struct scatterlist sg;
186
struct afs_net *net = server->cell->net;
187
const struct key *key = net->fs_cm_token_key;
188
size_t keysize, uuidsize, authsize, toksize, encsize, contsize, adatasize, offset;
189
__be32 caps[1] = {
190
[0] = htonl(AFS_CAP_ERROR_TRANSLATION),
191
};
192
__be32 *xdr;
193
void *appdata, *K0, *encbase;
194
u32 enctype;
195
int ret;
196
197
if (!key)
198
return -ENOKEY;
199
200
/* Assume that the fileserver is happy to use the same encoding type as
201
* we were told to use by the token obtained by the user.
202
*/
203
enctype = rxgk_kernel_query_challenge(challenge);
204
205
conn_krb5 = crypto_krb5_find_enctype(enctype);
206
if (!conn_krb5)
207
return -ENOPKG;
208
token_krb5 = key->payload.data[0];
209
token_key = (const struct krb5_buffer *)&key->payload.data[2];
210
211
/* struct rxgk_key {
212
* afs_uint32 enctype;
213
* opaque key<>;
214
* };
215
*/
216
keysize = 4 + xdr_len_object(conn_krb5->key_len);
217
218
/* struct RXGK_AuthName {
219
* afs_int32 kind;
220
* opaque data<AUTHDATAMAX>;
221
* opaque display<AUTHPRINTABLEMAX>;
222
* };
223
*/
224
uuidsize = sizeof(server->uuid);
225
authsize = 4 + xdr_len_object(uuidsize) + xdr_len_object(0);
226
227
/* struct RXGK_Token {
228
* rxgk_key K0;
229
* RXGK_Level level;
230
* rxgkTime starttime;
231
* afs_int32 lifetime;
232
* afs_int32 bytelife;
233
* rxgkTime expirationtime;
234
* struct RXGK_AuthName identities<>;
235
* };
236
*/
237
toksize = keysize + 8 + 4 + 4 + 8 + xdr_len_object(authsize);
238
239
offset = 0;
240
encsize = crypto_krb5_how_much_buffer(token_krb5, KRB5_ENCRYPT_MODE, toksize, &offset);
241
242
/* struct RXGK_TokenContainer {
243
* afs_int32 kvno;
244
* afs_int32 enctype;
245
* opaque encrypted_token<>;
246
* };
247
*/
248
contsize = 4 + 4 + xdr_len_object(encsize);
249
250
/* struct YFSAppData {
251
* opr_uuid initiatorUuid;
252
* opr_uuid acceptorUuid;
253
* Capabilities caps;
254
* afs_int32 enctype;
255
* opaque callbackKey<>;
256
* opaque callbackToken<>;
257
* };
258
*/
259
adatasize = 16 + 16 +
260
xdr_len_object(sizeof(caps)) +
261
4 +
262
xdr_len_object(conn_krb5->key_len) +
263
xdr_len_object(contsize);
264
265
ret = -ENOMEM;
266
appdata = kzalloc(adatasize, GFP_KERNEL);
267
if (!appdata)
268
goto out;
269
xdr = appdata;
270
271
memcpy(xdr, &net->uuid, 16); /* appdata.initiatorUuid */
272
xdr += 16 / 4;
273
memcpy(xdr, &server->uuid, 16); /* appdata.acceptorUuid */
274
xdr += 16 / 4;
275
*xdr++ = htonl(ARRAY_SIZE(caps)); /* appdata.caps.len */
276
memcpy(xdr, &caps, sizeof(caps)); /* appdata.caps */
277
xdr += ARRAY_SIZE(caps);
278
*xdr++ = htonl(conn_krb5->etype); /* appdata.enctype */
279
280
*xdr++ = htonl(conn_krb5->key_len); /* appdata.callbackKey.len */
281
K0 = xdr;
282
get_random_bytes(K0, conn_krb5->key_len); /* appdata.callbackKey.data */
283
xdr += xdr_round_up(conn_krb5->key_len) / 4;
284
285
*xdr++ = htonl(contsize); /* appdata.callbackToken.len */
286
*xdr++ = htonl(1); /* cont.kvno */
287
*xdr++ = htonl(token_krb5->etype); /* cont.enctype */
288
*xdr++ = htonl(encsize); /* cont.encrypted_token.len */
289
290
encbase = xdr;
291
xdr += offset / 4;
292
*xdr++ = htonl(conn_krb5->etype); /* token.K0.enctype */
293
*xdr++ = htonl(conn_krb5->key_len); /* token.K0.key.len */
294
memcpy(xdr, K0, conn_krb5->key_len); /* token.K0.key.data */
295
xdr += xdr_round_up(conn_krb5->key_len) / 4;
296
297
*xdr++ = htonl(RXRPC_SECURITY_ENCRYPT); /* token.level */
298
*xdr++ = htonl(0); /* token.starttime */
299
*xdr++ = htonl(0); /* " */
300
*xdr++ = htonl(0); /* token.lifetime */
301
*xdr++ = htonl(0); /* token.bytelife */
302
*xdr++ = htonl(0); /* token.expirationtime */
303
*xdr++ = htonl(0); /* " */
304
*xdr++ = htonl(1); /* token.identities.count */
305
*xdr++ = htonl(0); /* token.identities[0].kind */
306
*xdr++ = htonl(uuidsize); /* token.identities[0].data.len */
307
memcpy(xdr, &server->uuid, uuidsize);
308
xdr += xdr_round_up(uuidsize) / 4;
309
*xdr++ = htonl(0); /* token.identities[0].display.len */
310
311
xdr = encbase + xdr_round_up(encsize);
312
313
if ((unsigned long)xdr - (unsigned long)appdata != adatasize)
314
pr_err("Appdata size incorrect %lx != %zx\n",
315
(unsigned long)xdr - (unsigned long)appdata, adatasize);
316
317
aead = crypto_krb5_prepare_encryption(token_krb5, token_key, RXGK_SERVER_ENC_TOKEN,
318
GFP_KERNEL);
319
if (IS_ERR(aead)) {
320
ret = PTR_ERR(aead);
321
goto out_token;
322
}
323
324
sg_init_one(&sg, encbase, encsize);
325
ret = crypto_krb5_encrypt(token_krb5, aead, &sg, 1, encsize, offset, toksize, false);
326
if (ret < 0)
327
goto out_aead;
328
329
server->cm_rxgk_appdata.len = adatasize;
330
server->cm_rxgk_appdata.data = appdata;
331
appdata = NULL;
332
333
out_aead:
334
crypto_free_aead(aead);
335
out_token:
336
kfree(appdata);
337
out:
338
return ret;
339
}
340
#endif /* CONFIG_RXGK */
341
342