diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2022-11-09 12:44:37 +0100 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2022-11-14 15:21:58 +0100 |
commit | 0be72218f1c90af5755ab40f94d047ee6864aea8 (patch) | |
tree | 16b446b19ceb21b9faf8471020a7ab1c35db2ea8 /docs/BOOT_LOADER_INTERFACE.md | |
parent | 87172c3df63c97ab2f680720b1141720ef66a985 (diff) | |
download | systemd-0be72218f1c90af5755ab40f94d047ee6864aea8.tar.gz |
boot: implement kernel EFI RNG seed protocol with proper hashing
Rather than passing seeds up to userspace via EFI variables, pass seeds
directly to the kernel's EFI stub loader, via LINUX_EFI_RANDOM_SEED_TABLE_GUID.
EFI variables can potentially leak and suffer from forward secrecy
issues, and processing these with userspace means that they are
initialized much too late in boot to be useful. In contrast,
LINUX_EFI_RANDOM_SEED_TABLE_GUID uses EFI configuration tables, and so
is hidden from userspace entirely, and is parsed extremely early on by
the kernel, so that every single call to get_random_bytes() by the
kernel is seeded.
In order to do this properly, we use a bit more robust hashing scheme,
and make sure that each input is properly memzeroed out after use. The
scheme is:
key = HASH(LABEL || sizeof(input1) || input1 || ... || sizeof(inputN) || inputN)
new_disk_seed = HASH(key || 0)
seed_for_linux = HASH(key || 1)
The various inputs are:
- LINUX_EFI_RANDOM_SEED_TABLE_GUID from prior bootloaders
- 256 bits of seed from EFI's RNG
- The (immutable) system token, from its EFI variable
- The prior on-disk seed
- The UEFI monotonic counter
- A timestamp
This also adjusts the secure boot semantics, so that the operation is
only aborted if it's not possible to get random bytes from EFI's RNG or
a prior boot stage. With the proper hashing scheme, this should make
boot seeds safe even on secure boot.
There is currently a bug in Linux's EFI stub in which if the EFI stub
manages to generate random bytes on its own using EFI's RNG, it will
ignore what the bootloader passes. That's annoying, but it means that
either way, via systemd-boot or via EFI stub's mechanism, the RNG *does*
get initialized in a good safe way. And this bug is now fixed in the
efi.git tree, and will hopefully be backported to older kernels.
As the kernel recommends, the resultant seeds are 256 bits and are
allocated using pool memory of type EfiACPIReclaimMemory, so that it
gets freed at the right moment in boot.
Diffstat (limited to 'docs/BOOT_LOADER_INTERFACE.md')
-rw-r--r-- | docs/BOOT_LOADER_INTERFACE.md | 9 |
1 files changed, 1 insertions, 8 deletions
diff --git a/docs/BOOT_LOADER_INTERFACE.md b/docs/BOOT_LOADER_INTERFACE.md index fc9336085b..5be4d1ad17 100644 --- a/docs/BOOT_LOADER_INTERFACE.md +++ b/docs/BOOT_LOADER_INTERFACE.md @@ -80,12 +80,6 @@ variables. All EFI variables use the vendor UUID * `1 << 5` → The boot loader supports looking for boot menu entries in the Extended Boot Loader Partition. * `1 << 6` → The boot loader supports passing a random seed to the OS. -* The EFI variable `LoaderRandomSeed` contains a binary random seed if set. It - is set by the boot loader to pass an entropy seed read from the ESP to the OS. - The system manager then credits this seed to the kernel's entropy pool. It is - the responsibility of the boot loader to ensure the quality and integrity of - the random seed. - * The EFI variable `LoaderSystemToken` contains binary random data, persistently set by the OS installer. Boot loaders that support passing random seeds to the OS should use this data and combine it with the random @@ -107,8 +101,7 @@ that directory is empty, and only if no other file systems are mounted there. The `systemctl reboot --boot-loader-entry=…` and `systemctl reboot --boot-loader-menu=…` commands rely on the `LoaderFeatures` , `LoaderConfigTimeoutOneShot`, `LoaderEntries`, `LoaderEntryOneShot` -variables. `LoaderRandomSeed` is read by PID during early boot and credited to -the kernel's random pool. +variables. ## Boot Loader Entry Identifiers |