Allows users to enroll their own public key stored in a specific TPM2
NV Index, requiring the absence of the Platform Create and Platform
Write attributes on the NV Index, to be loaded on the IMA keyring.
Provides a method for users to load keys without the need to recompile
the kernel or change the kernel binary, which would require a resign of
the kernel image.
Signed-off-by: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
---
security/integrity/ima/Kconfig | 22 +++++++++++++
security/integrity/ima/ima_init.c | 53 +++++++++++++++++++++++++++++++
2 files changed, 75 insertions(+)
diff --git a/security/integrity/ima/Kconfig
b/security/integrity/ima/Kconfig
index 12e9250c1bec..28424b930c81 100644
--- a/security/integrity/ima/Kconfig
+++ b/security/integrity/ima/Kconfig
@@ -291,6 +291,28 @@ config IMA_BLACKLIST_KEYRING
the search is successful the requested operation is rejected
and
an error is returned to the caller.
+config IMA_LOAD_CERT_NVINDEX
+ bool "Load certificate from TPM nvindex into '.ima' trusted
keyring"
+ depends on IMA_TRUSTED_KEYRING && TCG_TPM
+ default n
+ help
+ File signature verification is based on the public keys
+ loaded on the .ima trusted keyring. These public keys are
+ X509 certificates signed by a trusted key on the
+ .system keyring. This option enables X509 certificate
+ loading by the kernel onto the '.ima' trusted keyring
+ from a TPM nvindex, bypassing the builtin keyring check.
+
+config IMA_LOAD_CERT_NVINDEX_INDEX
+ hex "The TPM NV Index to load into the '.ima' trusted keyring"
+ depends on IMA_LOAD_CERT_NVINDEX
+ default 0x184b520
+ help
+ Defines the index of the NV Index that gets loaded into the
+ '.ima' keyring.
+ The default is the "0x18" prefix for a non-TCG specified NV
Index,
+ suffixed with ASCII for "KR" (keyring) and then 0
+
config IMA_LOAD_X509
bool "Load X509 certificate onto the '.ima' trusted keyring"
depends on IMA_TRUSTED_KEYRING
diff --git a/security/integrity/ima/ima_init.c
b/security/integrity/ima/ima_init.c
index 6e8742916d1d..ea0949e8df12 100644
--- a/security/integrity/ima/ima_init.c
+++ b/security/integrity/ima/ima_init.c
@@ -112,6 +112,55 @@ void __init ima_load_x509(void)
}
#endif
+#ifndef CONFIG_IMA_LOAD_CERT_NVINDEX
+int __init ima_load_key_nvindex(void)
+{
+ return 0;
+}
+#else
+int __init ima_load_key_nvindex(void)
+{
+ void *cert_buffer;
+ int rc;
+ key_perm_t perm;
+ u32 nvindex_attributes = 0;
+
+ rc = tpm_nv_read(tpm_default_chip(),