mirror of
https://github.com/armbian/linux-cix.git
synced 2026-01-06 12:30:45 -08:00
tipc: add automatic session key exchange
With support from the master key option in the previous commit, it becomes easy to make frequent updates/exchanges of session keys between authenticated cluster nodes. Basically, there are two situations where the key exchange will take in place: - When a new node joins the cluster (with the master key), it will need to get its peer's TX key, so that be able to decrypt further messages from that peer. - When a new session key is generated (by either user manual setting or later automatic rekeying feature), the key will be distributed to all peer nodes in the cluster. A key to be exchanged is encapsulated in the data part of a 'MSG_CRYPTO /KEY_DISTR_MSG' TIPC v2 message, then xmit-ed as usual and encrypted by using the master key before sending out. Upon receipt of the message it will be decrypted in the same way as regular messages, then attached as the sender's RX key in the receiver node. In this way, the key exchange is reliable by the link layer, as well as security, integrity and authenticity by the crypto layer. Also, the forward security will be easily achieved by user changing the master key actively but this should not be required very frequently. The key exchange feature is independent on the presence of a master key Note however that the master key still is needed for new nodes to be able to join the cluster. It is also optional, and can be turned off/on via the sysfs: 'net/tipc/key_exchange_enabled' [default 1: enabled]. Backward compatibility is guaranteed because for nodes that do not have master key support, key exchange using master key ie. tx_key = 0 if any will be shortly discarded at the message validation step. In other words, the key exchange feature will be automatically disabled to those nodes. v2: fix the "implicit declaration of function 'tipc_crypto_key_flush'" error in node.c. The function only exists when built with the TIPC "CONFIG_TIPC_CRYPTO" option. v3: use 'info->extack' for a message emitted due to netlink operations instead (- David's comment). Reported-by: kernel test robot <lkp@intel.com> Acked-by: Jon Maloy <jmaloy@redhat.com> Signed-off-by: Tuong Lien <tuong.t.lien@dektech.com.au> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
committed by
David S. Miller
parent
daef1ee379
commit
1ef6f7c939
File diff suppressed because it is too large
Load Diff
@@ -67,6 +67,7 @@ enum {
|
||||
};
|
||||
|
||||
extern int sysctl_tipc_max_tfms __read_mostly;
|
||||
extern int sysctl_tipc_key_exchange_enabled __read_mostly;
|
||||
|
||||
/**
|
||||
* TIPC encryption message format:
|
||||
@@ -167,8 +168,31 @@ int tipc_crypto_rcv(struct net *net, struct tipc_crypto *rx,
|
||||
int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey,
|
||||
u8 mode, bool master_key);
|
||||
void tipc_crypto_key_flush(struct tipc_crypto *c);
|
||||
int tipc_crypto_key_distr(struct tipc_crypto *tx, u8 key,
|
||||
struct tipc_node *dest);
|
||||
void tipc_crypto_msg_rcv(struct net *net, struct sk_buff *skb);
|
||||
int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info);
|
||||
bool tipc_ehdr_validate(struct sk_buff *skb);
|
||||
|
||||
static inline u32 msg_key_gen(struct tipc_msg *m)
|
||||
{
|
||||
return msg_bits(m, 4, 16, 0xffff);
|
||||
}
|
||||
|
||||
static inline void msg_set_key_gen(struct tipc_msg *m, u32 gen)
|
||||
{
|
||||
msg_set_bits(m, 4, 16, 0xffff, gen);
|
||||
}
|
||||
|
||||
static inline u32 msg_key_mode(struct tipc_msg *m)
|
||||
{
|
||||
return msg_bits(m, 4, 0, 0xf);
|
||||
}
|
||||
|
||||
static inline void msg_set_key_mode(struct tipc_msg *m, u32 mode)
|
||||
{
|
||||
msg_set_bits(m, 4, 0, 0xf, mode);
|
||||
}
|
||||
|
||||
#endif /* _TIPC_CRYPTO_H */
|
||||
#endif
|
||||
|
||||
@@ -1250,6 +1250,11 @@ static bool tipc_data_input(struct tipc_link *l, struct sk_buff *skb,
|
||||
case MSG_FRAGMENTER:
|
||||
case BCAST_PROTOCOL:
|
||||
return false;
|
||||
#ifdef CONFIG_TIPC_CRYPTO
|
||||
case MSG_CRYPTO:
|
||||
tipc_crypto_msg_rcv(l->net, skb);
|
||||
return true;
|
||||
#endif
|
||||
default:
|
||||
pr_warn("Dropping received illegal msg type\n");
|
||||
kfree_skb(skb);
|
||||
|
||||
@@ -82,6 +82,7 @@ struct plist;
|
||||
#define NAME_DISTRIBUTOR 11
|
||||
#define MSG_FRAGMENTER 12
|
||||
#define LINK_CONFIG 13
|
||||
#define MSG_CRYPTO 14
|
||||
#define SOCK_WAKEUP 14 /* pseudo user */
|
||||
#define TOP_SRV 15 /* pseudo user */
|
||||
|
||||
@@ -749,6 +750,9 @@ static inline void msg_set_nameupper(struct tipc_msg *m, u32 n)
|
||||
#define GRP_RECLAIM_MSG 4
|
||||
#define GRP_REMIT_MSG 5
|
||||
|
||||
/* Crypto message types */
|
||||
#define KEY_DISTR_MSG 0
|
||||
|
||||
/*
|
||||
* Word 1
|
||||
*/
|
||||
|
||||
@@ -278,6 +278,14 @@ struct tipc_crypto *tipc_node_crypto_rx_by_list(struct list_head *pos)
|
||||
{
|
||||
return container_of(pos, struct tipc_node, list)->crypto_rx;
|
||||
}
|
||||
|
||||
struct tipc_crypto *tipc_node_crypto_rx_by_addr(struct net *net, u32 addr)
|
||||
{
|
||||
struct tipc_node *n;
|
||||
|
||||
n = tipc_node_find(net, addr);
|
||||
return (n) ? n->crypto_rx : NULL;
|
||||
}
|
||||
#endif
|
||||
|
||||
static void tipc_node_free(struct rcu_head *rp)
|
||||
@@ -303,7 +311,7 @@ void tipc_node_put(struct tipc_node *node)
|
||||
kref_put(&node->kref, tipc_node_kref_release);
|
||||
}
|
||||
|
||||
static void tipc_node_get(struct tipc_node *node)
|
||||
void tipc_node_get(struct tipc_node *node)
|
||||
{
|
||||
kref_get(&node->kref);
|
||||
}
|
||||
@@ -584,6 +592,9 @@ static void tipc_node_calculate_timer(struct tipc_node *n, struct tipc_link *l)
|
||||
|
||||
static void tipc_node_delete_from_list(struct tipc_node *node)
|
||||
{
|
||||
#ifdef CONFIG_TIPC_CRYPTO
|
||||
tipc_crypto_key_flush(node->crypto_rx);
|
||||
#endif
|
||||
list_del_rcu(&node->list);
|
||||
hlist_del_rcu(&node->hash);
|
||||
tipc_node_put(node);
|
||||
@@ -2930,6 +2941,10 @@ static int __tipc_nl_node_set_key(struct sk_buff *skb, struct genl_info *info)
|
||||
if (unlikely(rc < 0)) {
|
||||
GENL_SET_ERR_MSG(info, "unable to initiate or attach new key");
|
||||
return rc;
|
||||
} else if (c == tx) {
|
||||
/* Distribute TX key but not master one */
|
||||
if (!master_key && tipc_crypto_key_distr(tx, rc, NULL))
|
||||
GENL_SET_ERR_MSG(info, "failed to replicate new key");
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
@@ -79,12 +79,14 @@ bool tipc_node_get_id(struct net *net, u32 addr, u8 *id);
|
||||
u32 tipc_node_get_addr(struct tipc_node *node);
|
||||
char *tipc_node_get_id_str(struct tipc_node *node);
|
||||
void tipc_node_put(struct tipc_node *node);
|
||||
void tipc_node_get(struct tipc_node *node);
|
||||
struct tipc_node *tipc_node_create(struct net *net, u32 addr, u8 *peer_id,
|
||||
u16 capabilities, u32 hash_mixes,
|
||||
bool preliminary);
|
||||
#ifdef CONFIG_TIPC_CRYPTO
|
||||
struct tipc_crypto *tipc_node_crypto_rx(struct tipc_node *__n);
|
||||
struct tipc_crypto *tipc_node_crypto_rx_by_list(struct list_head *pos);
|
||||
struct tipc_crypto *tipc_node_crypto_rx_by_addr(struct net *net, u32 addr);
|
||||
#endif
|
||||
u32 tipc_node_try_addr(struct net *net, u8 *id, u32 addr);
|
||||
void tipc_node_check_dest(struct net *net, u32 onode, u8 *peer_id128,
|
||||
|
||||
@@ -74,6 +74,15 @@ static struct ctl_table tipc_table[] = {
|
||||
.proc_handler = proc_dointvec_minmax,
|
||||
.extra1 = SYSCTL_ONE,
|
||||
},
|
||||
{
|
||||
.procname = "key_exchange_enabled",
|
||||
.data = &sysctl_tipc_key_exchange_enabled,
|
||||
.maxlen = sizeof(sysctl_tipc_key_exchange_enabled),
|
||||
.mode = 0644,
|
||||
.proc_handler = proc_dointvec_minmax,
|
||||
.extra1 = SYSCTL_ZERO,
|
||||
.extra2 = SYSCTL_ONE,
|
||||
},
|
||||
#endif
|
||||
{
|
||||
.procname = "bc_retruni",
|
||||
|
||||
Reference in New Issue
Block a user