2023-02-08 21:01:48 +00:00
|
|
|
#!/bin/bash
|
2022-08-25 18:43:31 +00:00
|
|
|
# TPM Wrapper - to unify tpm and tpm2 subcommands
|
|
|
|
|
|
|
|
. /etc/functions
|
|
|
|
|
|
|
|
SECRET_DIR="/tmp/secret"
|
|
|
|
PRIMARY_HANDLE="0x81000000"
|
|
|
|
ENC_SESSION_FILE="enc.ctx"
|
|
|
|
DEC_SESSION_FILE="dec.ctx"
|
|
|
|
PRIMARY_HANDLE_FILE="primary.handle"
|
|
|
|
|
|
|
|
set -e -o pipefail
|
|
|
|
if [ -r "/tmp/config" ]; then
|
|
|
|
. /tmp/config
|
|
|
|
else
|
|
|
|
. /etc/config
|
|
|
|
fi
|
|
|
|
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr"
|
|
|
|
|
2022-08-25 18:43:31 +00:00
|
|
|
if [ "$CONFIG_TPM2_TOOLS" != "y" ]; then
|
tpm2-tools: Change sense of CONFIG_TPM to mean any TPM, not just TPM1.
Most logic throughout Heads doesn't need to know TPM1 versus TPM2 (and
shouldn't, the differences should be localized). Some checks were
incorrect and are fixed by this change. Most checks are now unchanged
relative to master.
There are not that many places outside of tpmr that need to
differentiate TPM1 and TPM2. Some of those are duplicate code that
should be consolidated (seal-hotpkey, unseal-totp, unseal-hotp), and
some more are probably good candidates for abstracting in tpmr so the
business logic doesn't have to know TPM1 vs. TPM2.
Previously, CONFIG_TPM could be variously 'y', 'n', or empty. Now it
is always 'y' or 'n', and 'y' means "any TPM". Board configs are
unchanged, setting CONFIG_TPM2_TOOLS=y implies CONFIG_TPM=y so this
doesn't have to be duplicated and can't be mistakenly mismatched.
There were a few checks for CONFIG_TPM = n that only coincidentally
worked for TPM2 because CONFIG_TPM was empty (not 'n'). This test is
now OK, but the checks were also cleaned up to '!= "y"' for robustness.
Signed-off-by: Jonathon Hall <jonathon.hall@puri.sm>
2023-02-22 21:30:07 +00:00
|
|
|
# tpm1 does not need to convert options
|
|
|
|
if [ "$CONFIG_TPM" = "y" ]; then
|
|
|
|
exec tpm "$@"
|
|
|
|
fi
|
2022-08-25 18:43:31 +00:00
|
|
|
echo >&2 "No TPM2!"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
tpm2_extend() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_extend"
|
|
|
|
DEBUG "value of passed arguments: $1 $2 $3 $4 $5 $6"
|
2022-08-25 18:43:31 +00:00
|
|
|
while true; do
|
|
|
|
case "$1" in
|
|
|
|
-ix)
|
2023-02-23 22:05:15 +00:00
|
|
|
DEBUG "case: -ix $2"
|
2022-08-25 18:43:31 +00:00
|
|
|
index="$2"
|
|
|
|
shift 2;;
|
|
|
|
-ic)
|
2023-02-23 22:05:15 +00:00
|
|
|
DEBUG "case: -ic $2"
|
2022-08-25 18:43:31 +00:00
|
|
|
hash="`echo $2|sha256sum|cut -d' ' -f1`"
|
|
|
|
shift 2;;
|
|
|
|
-if)
|
2023-02-23 22:05:15 +00:00
|
|
|
DEBUG "case: -if $2"
|
2022-08-25 18:43:31 +00:00
|
|
|
hash="`sha256sum $2|cut -d' ' -f1`"
|
|
|
|
shift 2;;
|
|
|
|
*)
|
|
|
|
break;;
|
|
|
|
esac
|
|
|
|
done
|
2023-02-23 22:05:15 +00:00
|
|
|
DEBUG "tpm2 pcrextend $index:sha256=$hash"
|
2022-08-25 18:43:31 +00:00
|
|
|
tpm2 pcrextend "$index:sha256=$hash"
|
2023-02-23 22:05:15 +00:00
|
|
|
DEBUG "tpm2 pcread sha256:$index"
|
|
|
|
tpm2 pcrread "sha256:$index"
|
|
|
|
DEBUG "$(pcrs)"
|
2022-08-25 18:43:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tpm2_counter_read() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_counter_read"
|
2022-08-25 18:43:31 +00:00
|
|
|
while true; do
|
|
|
|
case "$1" in
|
|
|
|
-ix)
|
|
|
|
index="$2"
|
|
|
|
shift 2;;
|
|
|
|
*)
|
|
|
|
break;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
echo "$index: `tpm2 nvread 0x$index | xxd -pc8`"
|
|
|
|
}
|
|
|
|
|
|
|
|
tpm2_counter_inc() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_counter_inc"
|
2022-08-25 18:43:31 +00:00
|
|
|
while true; do
|
|
|
|
case "$1" in
|
|
|
|
-ix)
|
|
|
|
index="$2"
|
|
|
|
shift 2;;
|
|
|
|
-pwdc)
|
|
|
|
pwd="$2"
|
|
|
|
shift 2;;
|
|
|
|
*)
|
|
|
|
break;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
tpm2 nvincrement "0x$index" > /dev/console
|
|
|
|
echo "$index: `tpm2 nvread 0x$index | xxd -pc8`"
|
|
|
|
}
|
|
|
|
|
|
|
|
tpm2_counter_cre() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_counter_cre"
|
2022-08-25 18:43:31 +00:00
|
|
|
while true; do
|
|
|
|
case "$1" in
|
|
|
|
-pwdo)
|
|
|
|
pwdo="$2"
|
|
|
|
shift 2;;
|
|
|
|
-pwdof)
|
|
|
|
pwdo="file:$2"
|
|
|
|
shift 2;;
|
|
|
|
-pwdc)
|
|
|
|
pwd="$2"
|
|
|
|
shift 2;;
|
|
|
|
-la)
|
|
|
|
label="$2"
|
|
|
|
shift 2;;
|
|
|
|
*)
|
|
|
|
break;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
rand_index="1`dd if=/dev/urandom bs=1 count=3 | xxd -pc3`"
|
|
|
|
tpm2 nvdefine -C o -s 8 -a "ownerread|authread|authwrite|nt=1" -P "$pwdo" "0x$rand_index" > /dev/console
|
|
|
|
echo "$rand_index: (valid after an increment)"
|
|
|
|
}
|
|
|
|
|
|
|
|
tpm2_startsession() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_startsession"
|
2022-08-25 18:43:31 +00:00
|
|
|
mkdir -p "$SECRET_DIR"
|
2023-02-24 20:52:10 +00:00
|
|
|
tpm2 flushcontext -Q \
|
2022-08-25 18:43:31 +00:00
|
|
|
--transient-object \
|
|
|
|
|| die "tpm2_flushcontext: unable to flush transient handles"
|
|
|
|
|
2023-02-24 20:52:10 +00:00
|
|
|
tpm2 flushcontext -Q \
|
2022-08-25 18:43:31 +00:00
|
|
|
--loaded-session \
|
|
|
|
|| die "tpm2_flushcontext: unable to flush sessions"
|
|
|
|
|
2023-02-24 20:52:10 +00:00
|
|
|
tpm2 flushcontext -Q \
|
2022-08-25 18:43:31 +00:00
|
|
|
--saved-session \
|
|
|
|
|| die "tpm2_flushcontext: unable to flush saved session"
|
2023-02-24 20:52:10 +00:00
|
|
|
tpm2 readpublic -Q -c "$PRIMARY_HANDLE" -t "/tmp/$PRIMARY_HANDLE_FILE"
|
|
|
|
tpm2 startauthsession -Q -c "/tmp/$PRIMARY_HANDLE_FILE" --hmac-session -S "/tmp/$ENC_SESSION_FILE"
|
|
|
|
tpm2 startauthsession -Q -c "/tmp/$PRIMARY_HANDLE_FILE" --hmac-session -S "/tmp/$DEC_SESSION_FILE"
|
|
|
|
tpm2 sessionconfig -Q --disable-encrypt "/tmp/$DEC_SESSION_FILE"
|
2022-08-25 18:43:31 +00:00
|
|
|
}
|
|
|
|
|
2023-02-24 20:52:10 +00:00
|
|
|
# Trap EXIT with cleanup_session() to release a TPM2 session and delete the
|
|
|
|
# session file. E.g.:
|
|
|
|
# trap "cleanup_session '$SESSION_FILE'" EXIT
|
|
|
|
cleanup_session() {
|
|
|
|
session_file="$1"
|
|
|
|
if [ -f "$session_file" ]; then
|
|
|
|
DEBUG "Clean up session: $session_file"
|
|
|
|
# Nothing else we can do if this fails, still remove the file
|
|
|
|
tpm2 flushcontext -Q "$session_file" || DEBUG "Flush failed for session $session_file"
|
|
|
|
rm -f "$session_file"
|
|
|
|
else
|
|
|
|
DEBUG "No need to clean up session: $session_file"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# tpm2_sealfile: Seal a file against PCR values and, optionally, a password.
|
|
|
|
# If a password is given, both the PCRs and password are required to unseal the
|
|
|
|
# file. PCRs are provided as a PCR list and data file. PCR data must be
|
|
|
|
# provided - TPM2 allows the TPM to fall back to current PCR values, but it is
|
|
|
|
# not required to support this.
|
2022-08-25 18:43:31 +00:00
|
|
|
tpm2_sealfile() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_sealfile"
|
2022-08-25 18:43:31 +00:00
|
|
|
file="$1" #$KEY_FILE
|
|
|
|
handle="$2" # 0x8100000$TPM_INDEX
|
|
|
|
pcrl="$3" #sha256:0,1,2,3,4,5,6,7
|
|
|
|
pcrf="$4"
|
|
|
|
pass="$5"
|
|
|
|
mkdir -p "$SECRET_DIR"
|
|
|
|
bname="`basename $file`"
|
2023-02-24 20:52:10 +00:00
|
|
|
|
|
|
|
# Create a policy requiring both PCRs and the object's authentication
|
|
|
|
# value using a trial session.
|
|
|
|
TRIAL_SESSION=/tmp/sealfile_trial.session
|
|
|
|
AUTH_POLICY=/tmp/sealfile_auth.policy
|
|
|
|
rm -f "$TRIAL_SESSION" "$AUTH_POLICY"
|
|
|
|
tpm2 startauthsession -g sha256 -S "$TRIAL_SESSION"
|
|
|
|
# We have to clean up the session
|
|
|
|
trap "cleanup_session '$TRIAL_SESSION'" EXIT
|
|
|
|
# Save the policy hash in case the password policy is not used (we have
|
|
|
|
# to get this from the last step, whichever it is).
|
|
|
|
tpm2 policypcr -Q -l "$pcrl" -f "$pcrf" -S "$TRIAL_SESSION" -L "$AUTH_POLICY"
|
|
|
|
CREATE_PASS_ARGS=()
|
|
|
|
if [ "$pass" ]; then
|
|
|
|
# Add an object authorization policy (the object authorization
|
|
|
|
# will be the password). Save the digest, this is the resulting
|
|
|
|
# policy.
|
|
|
|
tpm2 policypassword -Q -S "$TRIAL_SESSION" -L "$AUTH_POLICY"
|
|
|
|
# Pass the password to create later
|
|
|
|
# TODO: Providing the raw password to the TPM limits it to the
|
|
|
|
# size of the largest supported hash (at least 32 chars, sha256)
|
|
|
|
CREATE_PASS_ARGS=(-p "hex:$(echo -n "$pass" | xxd -p | tr -d '\n ')")
|
2022-08-25 18:43:31 +00:00
|
|
|
fi
|
2023-02-24 20:52:10 +00:00
|
|
|
|
|
|
|
# Create the object with this policy and the auth value.
|
|
|
|
# NOTE: We disable USERWITHAUTH and enable ADMINWITHPOLICY so the
|
|
|
|
# password cannot be used on its own, the PCRs are also required.
|
|
|
|
# (The default is to allow either policy auth _or_ password auth. In
|
|
|
|
# this case the policy includes the password, and we don't want to allow
|
|
|
|
# the password on its own.)
|
|
|
|
# TODO: Check the other default attributes, do we want them?
|
|
|
|
# TODO: Providing the password directly limits it to the size of the
|
|
|
|
# largest hash supported by the TPM (at least 32 chars for sha256)
|
|
|
|
# TODO: The attributes aren't working yet, rejected with 'inconsistent attributes'
|
|
|
|
# -a 'sign|decrypt|fixedtpm|fixedparent|sensitivedataorigin|adminwithpolicy'
|
|
|
|
tpm2 create -Q -C "/tmp/$PRIMARY_HANDLE_FILE" \
|
|
|
|
-i "$file" \
|
|
|
|
-u "$SECRET_DIR/$bname.priv" \
|
|
|
|
-r "$SECRET_DIR/$bname.pub" \
|
|
|
|
-L "$AUTH_POLICY" \
|
|
|
|
-S "/tmp/$DEC_SESSION_FILE" \
|
|
|
|
"${CREATE_PASS_ARGS[@]}"
|
|
|
|
|
|
|
|
tpm2 load -Q -C "/tmp/$PRIMARY_HANDLE_FILE" -u "$SECRET_DIR/$bname.priv" -r "$SECRET_DIR/$bname.pub" -c "$SECRET_DIR/$bname.seal.ctx"
|
2023-02-22 19:24:49 +00:00
|
|
|
read -s -p "TPM owner password: " key_password
|
2023-02-24 20:52:10 +00:00
|
|
|
echo # new line after password prompt
|
2022-08-25 18:43:31 +00:00
|
|
|
# remove possible data occupying this handle
|
2023-02-24 20:52:10 +00:00
|
|
|
tpm2 evictcontrol -Q -C o -P "$key_password" -c "$handle" 2>/dev/null || true
|
|
|
|
tpm2 evictcontrol -Q -C o -P "$key_password" -c "$SECRET_DIR/$bname.seal.ctx" "$handle"
|
2022-08-25 18:43:31 +00:00
|
|
|
}
|
|
|
|
|
2023-02-24 20:52:10 +00:00
|
|
|
# Unseal a file sealed by tpm2_sealfile. The PCR list must be provided, the
|
|
|
|
# password must be provided if one was used to seal (and cannot be provided if
|
|
|
|
# no password was used to seal).
|
|
|
|
tpm2_unsealfile() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_unseal"
|
2022-08-25 18:43:31 +00:00
|
|
|
handle="$1"
|
|
|
|
pcrl="$2"
|
2023-02-24 20:52:10 +00:00
|
|
|
file="$3"
|
|
|
|
pass="$4"
|
|
|
|
|
|
|
|
POLICY_SESSION=/tmp/unsealfile_policy.session
|
|
|
|
rm -f "$POLICY_SESSION"
|
|
|
|
tpm2 startauthsession -Q -g sha256 -c "/tmp/$PRIMARY_HANDLE_FILE" -S "$POLICY_SESSION" --policy-session
|
|
|
|
trap "cleanup_session '$POLICY_SESSION'" EXIT
|
|
|
|
# Check the PCR policy
|
|
|
|
tpm2 policypcr -Q -l "$pcrl" -S "$POLICY_SESSION"
|
|
|
|
UNSEAL_PASS_SUFFIX=""
|
|
|
|
if [ "$pass" ]; then
|
|
|
|
# Add the object authorization policy (the actual password is
|
|
|
|
# provided later, but we must include this so the policy we
|
|
|
|
# attempt to use is correct).
|
|
|
|
tpm2 policypassword -Q -S "$POLICY_SESSION"
|
|
|
|
# When unsealing, include the password with the auth session
|
|
|
|
UNSEAL_PASS_SUFFIX="+hex:$(echo -n "$pass" | xxd -p | tr -d '\n ')"
|
|
|
|
# Disable encryption in the policy session - there seems to be a
|
|
|
|
# bug in tpm2's decryption. If we leave encryption enabled, the
|
|
|
|
# unseal succeeds but we receive garbage, probably because it
|
|
|
|
# was decrypted incorrectly. However, this causes the unsealed
|
|
|
|
# data to be sent in the clear from the TPM.
|
|
|
|
tpm2 sessionconfig -Q --disable-encrypt "$POLICY_SESSION"
|
2022-08-25 18:43:31 +00:00
|
|
|
fi
|
2023-02-24 20:52:10 +00:00
|
|
|
|
|
|
|
tpm2 unseal -Q -c "$handle" -p "session:$POLICY_SESSION$UNSEAL_PASS_SUFFIX" > "$file"
|
2022-08-25 18:43:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tpm2_reset() {
|
2023-02-23 22:05:15 +00:00
|
|
|
TRACE "Under /bin/tpmr:tpm2_reset"
|
2023-02-22 21:26:53 +00:00
|
|
|
key_password="$1"
|
2022-08-25 18:43:31 +00:00
|
|
|
mkdir -p "$SECRET_DIR"
|
|
|
|
tpm2 clear -c platform || warn "Unable to clear TPM on platform hierarchy!"
|
|
|
|
tpm2 changeauth -c owner "$key_password"
|
|
|
|
tpm2 createprimary -C owner -g sha256 -G "${CONFIG_PRIMARY_KEY_TYPE:-rsa}" -c "$SECRET_DIR/primary.ctx" -P "$key_password"
|
|
|
|
tpm2 evictcontrol -C owner -c "$SECRET_DIR/primary.ctx" "$PRIMARY_HANDLE" -P "$key_password"
|
|
|
|
shred -u "$SECRET_DIR/primary.ctx"
|
|
|
|
tpm2_startsession
|
|
|
|
}
|
|
|
|
subcmd="$1"
|
|
|
|
shift 1
|
|
|
|
case "$subcmd" in
|
|
|
|
extend)
|
|
|
|
tpm2_extend "$@";;
|
|
|
|
counter_read)
|
|
|
|
tpm2_counter_read "$@";;
|
|
|
|
counter_increment)
|
|
|
|
tpm2_counter_inc "$@";;
|
|
|
|
counter_create)
|
|
|
|
tpm2_counter_cre "$@";;
|
|
|
|
nv_definespace)
|
|
|
|
tpm2_nvdef "$@";;
|
|
|
|
nv_writevalue)
|
|
|
|
tpm2_nvw "$@";;
|
|
|
|
nv_readvalue)
|
|
|
|
tpm2_nvr "$@";;
|
|
|
|
seal)
|
|
|
|
tpm2_sealfile "$@";;
|
|
|
|
startsession)
|
|
|
|
tpm2_startsession "$@";;
|
|
|
|
unseal)
|
2023-02-24 20:52:10 +00:00
|
|
|
tpm2_unsealfile "$@";;
|
2022-08-25 18:43:31 +00:00
|
|
|
reset)
|
2023-02-22 21:26:53 +00:00
|
|
|
tpm2_reset "$@";;
|
2022-08-25 18:43:31 +00:00
|
|
|
*)
|
|
|
|
echo "Command $subcmd not wrapped!"
|
|
|
|
exit 1
|
|
|
|
esac
|