forked from luck/tmp_suning_uos_patched
23700da29b
Rekeying is required for security since a key is less secure when using for a long time. Also, key will be detached when its nonce value (or seqno ...) is exhausted. We now make the rekeying process automatic and configurable by user. Basically, TIPC will at a specific interval generate a new key by using the kernel 'Random Number Generator' cipher, then attach it as the node TX key and securely distribute to others in the cluster as RX keys (- the key exchange). The automatic key switching will then take over, and make the new key active shortly. Afterwards, the traffic from this node will be encrypted with the new session key. The same can happen in peer nodes but not necessarily at the same time. For simplicity, the automatically generated key will be initiated as a per node key. It is not too hard to also support a cluster key rekeying (e.g. a given node will generate a unique cluster key and update to the others in the cluster...), but that doesn't bring much benefit, while a per-node key is even more secure. We also enable user to force a rekeying or change the rekeying interval via netlink, the new 'set key' command option: 'TIPC_NLA_NODE_REKEYING' is added for these purposes as follows: - A value >= 1 will be set as the rekeying interval (in minutes); - A value of 0 will disable the rekeying; - A value of 'TIPC_REKEYING_NOW' (~0) will force an immediate rekeying; The default rekeying interval is (60 * 24) minutes i.e. done every day. There isn't any restriction for the value but user shouldn't set it too small or too large which results in an "ineffective" rekeying (thats ok for testing though). Acked-by: Jon Maloy <jmaloy@redhat.com> Signed-off-by: Tuong Lien <tuong.t.lien@dektech.com.au> Signed-off-by: David S. Miller <davem@davemloft.net>
201 lines
7.3 KiB
C
201 lines
7.3 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/**
|
|
* net/tipc/crypto.h: Include file for TIPC crypto
|
|
*
|
|
* Copyright (c) 2019, Ericsson AB
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the names of the copyright holders nor the names of its
|
|
* contributors may be used to endorse or promote products derived from
|
|
* this software without specific prior written permission.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of the
|
|
* GNU General Public License ("GPL") version 2 as published by the Free
|
|
* Software Foundation.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
#ifdef CONFIG_TIPC_CRYPTO
|
|
#ifndef _TIPC_CRYPTO_H
|
|
#define _TIPC_CRYPTO_H
|
|
|
|
#include "core.h"
|
|
#include "node.h"
|
|
#include "msg.h"
|
|
#include "bearer.h"
|
|
|
|
#define TIPC_EVERSION 7
|
|
|
|
/* AEAD aes(gcm) */
|
|
#define TIPC_AES_GCM_KEY_SIZE_128 16
|
|
#define TIPC_AES_GCM_KEY_SIZE_192 24
|
|
#define TIPC_AES_GCM_KEY_SIZE_256 32
|
|
|
|
#define TIPC_AES_GCM_SALT_SIZE 4
|
|
#define TIPC_AES_GCM_IV_SIZE 12
|
|
#define TIPC_AES_GCM_TAG_SIZE 16
|
|
|
|
/**
|
|
* TIPC crypto modes:
|
|
* - CLUSTER_KEY:
|
|
* One single key is used for both TX & RX in all nodes in the cluster.
|
|
* - PER_NODE_KEY:
|
|
* Each nodes in the cluster has one TX key, for RX a node needs to know
|
|
* its peers' TX key for the decryption of messages from those nodes.
|
|
*/
|
|
enum {
|
|
CLUSTER_KEY = 1,
|
|
PER_NODE_KEY = (1 << 1),
|
|
};
|
|
|
|
extern int sysctl_tipc_max_tfms __read_mostly;
|
|
extern int sysctl_tipc_key_exchange_enabled __read_mostly;
|
|
|
|
/**
|
|
* TIPC encryption message format:
|
|
*
|
|
* 3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0
|
|
* 1 0 9 8 7 6 5 4|3 2 1 0 9 8 7 6|5 4 3 2 1 0 9 8|7 6 5 4 3 2 1 0
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* w0:|Ver=7| User |D|TX |RX |K|M|N| Rsvd |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* w1:| Seqno |
|
|
* w2:| (8 octets) |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* w3:\ Prevnode \
|
|
* / (4 or 16 octets) /
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* \ \
|
|
* / Encrypted complete TIPC V2 header and user data /
|
|
* \ \
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | |
|
|
* | AuthTag |
|
|
* | (16 octets) |
|
|
* | |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
*
|
|
* Word0:
|
|
* Ver : = 7 i.e. TIPC encryption message version
|
|
* User : = 7 (for LINK_PROTOCOL); = 13 (for LINK_CONFIG) or = 0
|
|
* D : The destined bit i.e. the message's destination node is
|
|
* "known" or not at the message encryption
|
|
* TX : TX key used for the message encryption
|
|
* RX : Currently RX active key corresponding to the destination
|
|
* node's TX key (when the "D" bit is set)
|
|
* K : Keep-alive bit (for RPS, LINK_PROTOCOL/STATE_MSG only)
|
|
* M : Bit indicates if sender has master key
|
|
* N : Bit indicates if sender has no RX keys corresponding to the
|
|
* receiver's TX (when the "D" bit is set)
|
|
* Rsvd : Reserved bit, field
|
|
* Word1-2:
|
|
* Seqno : The 64-bit sequence number of the encrypted message, also
|
|
* part of the nonce used for the message encryption/decryption
|
|
* Word3-:
|
|
* Prevnode: The source node address, or ID in case LINK_CONFIG only
|
|
* AuthTag : The authentication tag for the message integrity checking
|
|
* generated by the message encryption
|
|
*/
|
|
struct tipc_ehdr {
|
|
union {
|
|
struct {
|
|
#if defined(__LITTLE_ENDIAN_BITFIELD)
|
|
__u8 destined:1,
|
|
user:4,
|
|
version:3;
|
|
__u8 reserved_1:1,
|
|
rx_nokey:1,
|
|
master_key:1,
|
|
keepalive:1,
|
|
rx_key_active:2,
|
|
tx_key:2;
|
|
#elif defined(__BIG_ENDIAN_BITFIELD)
|
|
__u8 version:3,
|
|
user:4,
|
|
destined:1;
|
|
__u8 tx_key:2,
|
|
rx_key_active:2,
|
|
keepalive:1,
|
|
master_key:1,
|
|
rx_nokey:1,
|
|
reserved_1:1;
|
|
#else
|
|
#error "Please fix <asm/byteorder.h>"
|
|
#endif
|
|
__be16 reserved_2;
|
|
} __packed;
|
|
__be32 w0;
|
|
};
|
|
__be64 seqno;
|
|
union {
|
|
__be32 addr;
|
|
__u8 id[NODE_ID_LEN]; /* For a LINK_CONFIG message only! */
|
|
};
|
|
#define EHDR_SIZE (offsetof(struct tipc_ehdr, addr) + sizeof(__be32))
|
|
#define EHDR_CFG_SIZE (sizeof(struct tipc_ehdr))
|
|
#define EHDR_MIN_SIZE (EHDR_SIZE)
|
|
#define EHDR_MAX_SIZE (EHDR_CFG_SIZE)
|
|
#define EMSG_OVERHEAD (EHDR_SIZE + TIPC_AES_GCM_TAG_SIZE)
|
|
} __packed;
|
|
|
|
int tipc_crypto_start(struct tipc_crypto **crypto, struct net *net,
|
|
struct tipc_node *node);
|
|
void tipc_crypto_stop(struct tipc_crypto **crypto);
|
|
void tipc_crypto_timeout(struct tipc_crypto *rx);
|
|
int tipc_crypto_xmit(struct net *net, struct sk_buff **skb,
|
|
struct tipc_bearer *b, struct tipc_media_addr *dst,
|
|
struct tipc_node *__dnode);
|
|
int tipc_crypto_rcv(struct net *net, struct tipc_crypto *rx,
|
|
struct sk_buff **skb, struct tipc_bearer *b);
|
|
int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey,
|
|
u8 mode, bool master_key);
|
|
void tipc_crypto_key_flush(struct tipc_crypto *c);
|
|
int tipc_crypto_key_distr(struct tipc_crypto *tx, u8 key,
|
|
struct tipc_node *dest);
|
|
void tipc_crypto_msg_rcv(struct net *net, struct sk_buff *skb);
|
|
void tipc_crypto_rekeying_sched(struct tipc_crypto *tx, bool changed,
|
|
u32 new_intv);
|
|
int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info);
|
|
bool tipc_ehdr_validate(struct sk_buff *skb);
|
|
|
|
static inline u32 msg_key_gen(struct tipc_msg *m)
|
|
{
|
|
return msg_bits(m, 4, 16, 0xffff);
|
|
}
|
|
|
|
static inline void msg_set_key_gen(struct tipc_msg *m, u32 gen)
|
|
{
|
|
msg_set_bits(m, 4, 16, 0xffff, gen);
|
|
}
|
|
|
|
static inline u32 msg_key_mode(struct tipc_msg *m)
|
|
{
|
|
return msg_bits(m, 4, 0, 0xf);
|
|
}
|
|
|
|
static inline void msg_set_key_mode(struct tipc_msg *m, u32 mode)
|
|
{
|
|
msg_set_bits(m, 4, 0, 0xf, mode);
|
|
}
|
|
|
|
#endif /* _TIPC_CRYPTO_H */
|
|
#endif
|