qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: "Daniel P. Berrangé" <berrange@redhat.com>
To: Zhuoying Cai <zycai@linux.ibm.com>
Cc: Markus Armbruster <armbru@redhat.com>,
	thuth@redhat.com, richard.henderson@linaro.org, david@redhat.com,
	jrossi@linux.ibm.com, qemu-s390x@nongnu.org,
	qemu-devel@nongnu.org, walling@linux.ibm.com,
	jjherne@linux.ibm.com, pasic@linux.ibm.com,
	borntraeger@linux.ibm.com, farman@linux.ibm.com,
	mjrosato@linux.ibm.com, iii@linux.ibm.com, eblake@redhat.com,
	alifm@linux.ibm.com
Subject: Re: [PATCH v5 01/29] Add boot-certs to s390-ccw-virtio machine type option
Date: Mon, 15 Sep 2025 18:18:18 +0100	[thread overview]
Message-ID: <aMhKWu7i-9MgO30H@redhat.com> (raw)
In-Reply-To: <14c613b1-d595-4cf1-b26e-5d87965a2c98@linux.ibm.com>

On Mon, Sep 15, 2025 at 12:14:50PM -0400, Zhuoying Cai wrote:
> On 9/15/25 2:44 AM, Markus Armbruster wrote:
> > Zhuoying Cai <zycai@linux.ibm.com> writes:
> > 
> >> On 9/12/25 2:42 AM, Markus Armbruster wrote:
> >>> Zhuoying Cai <zycai@linux.ibm.com> writes:
> >>>
> >>>> Thanks for the feedback.
> >>>>
> >>>> On 9/11/25 3:24 AM, Markus Armbruster wrote:
> >>>>> Zhuoying Cai <zycai@linux.ibm.com> writes:
> >>>>>
> >>>>>> Introduce a new `boot-certs` machine type option for the s390-ccw-virtio
> >>>>>> machine. This allows users to specify one or more certificate file paths
> >>>>>> or directories to be used during secure boot.
> >>>>>>
> >>>>>> Each entry is specified using the syntax:
> >>>>>> 	boot-certs.<index>.path=/path/to/cert.pem
> >>>>>>
> >>>>>> Multiple paths can be specify using array properties:
> >>>>>> 	boot-certs.0.path=/path/to/cert.pem,
> >>>>>> 	boot-certs.1.path=/path/to/cert-dir,
> >>>>>> 	boot-certs.2.path=/path/to/another-dir...
> >>>>>>
> >>>>>> Signed-off-by: Zhuoying Cai <zycai@linux.ibm.com>
> >>>>>> ---
> >>>>>>  docs/system/s390x/secure-ipl.rst   | 20 ++++++++++++++++++++
> >>>>>>  hw/s390x/s390-virtio-ccw.c         | 30 ++++++++++++++++++++++++++++++
> >>>>>>  include/hw/s390x/s390-virtio-ccw.h |  2 ++
> >>>>>>  qapi/machine-s390x.json            | 24 ++++++++++++++++++++++++
> >>>>>>  qemu-options.hx                    |  6 +++++-
> >>>>>>  5 files changed, 81 insertions(+), 1 deletion(-)
> >>>>>>  create mode 100644 docs/system/s390x/secure-ipl.rst
> >>>>>>
> >>>>>> diff --git a/docs/system/s390x/secure-ipl.rst b/docs/system/s390x/secure-ipl.rst
> >>>>>> new file mode 100644
> >>>>>> index 0000000000..9b3fd25cc4
> >>>>>> --- /dev/null
> >>>>>> +++ b/docs/system/s390x/secure-ipl.rst
> >>>>>> @@ -0,0 +1,20 @@
> >>>>>> +.. SPDX-License-Identifier: GPL-2.0-or-later
> >>>>>> +
> >>>>>> +Secure IPL Command Line Options
> >>>>>> +===============================
> >>>>>> +
> >>>>>> +New parameters have been introduced to s390-ccw-virtio machine type option
> >>>>>> +to support secure IPL. These parameters allow users to provide certificates
> >>>>>> +and enable secure IPL directly via the command line.
> >>>>>
> >>>>> All too soon these parameters will no longer be new.  Consider something
> >>>>> like "The s390-ccw-virtio machine type supports secure TPL.  To enable
> >>>>> it, you need to provide certificates."
> >>>>>
> >>>>>> +
> >>>>>> +Providing Certificates
> >>>>>> +----------------------
> >>>>>> +
> >>>>>> +The certificate store can be populated by supplying a list of certificate file
> >>>>>> +paths or directories on the command-line:
> >>>>>
> >>>>> File is clear enough (use the certificate found in the file).  What does
> >>>>> directory do?
> >>>>
> >>>> A directory contains a list of certificate files, and allowing both
> >>>> files and directories could make the CLI more flexible.
> >>>
> >>> I figure when @path names a file, it's an error when the file doesn't
> >>> contain a valid cetificate.
> >>>
> >>> What is @path names a directory, and one of the directory's files
> >>> doesn't contain a valid certificate?
> >>>
> >>> Can a single file contain multiple certificates?
> >>
> >> A certificate file path is expected to contain exactly one certificate.
> >>
> >> Certificates provided through the CLI, whether as individual files or
> >> within a directory, are validated before use. If a certificate is
> >> invalid (e.g., unsupported format), it will be skipped and not added to
> >> the S390 certificate store.
> > 
> > Hmm.  What exactly happens when I configure a certificate file like
> > 
> >     -machine s390-ccw-virtio,boot-certs.0.path=/dev/null
> > 
> > or some other file that doesn't contain a valud certificate?  Is it
> > silently ignored, or is it an error?
> > 
> >> When iterating through the provided paths, the program will terminate on
> >> fatal configuration errors, such as when a specified path is neither a
> >> file nor a directory.
> > 
> 
> If /dev/null is provided, the program will report an error and terminates.
> 
>    qemu-system-s390x: Path '/dev/null' is neither a file nor a directory
> 
> If a file exists but doesn't contain a valid certificate, the program
> will report the error but continues validating other remaining
> certificates. For example, providing a certificate in DER format
> (cert.pem) is not supported; only PEM format certificates are accepted:
> 
>    -machine s390-ccw-virtio,boot-certs.0.path=/root/cert.pem, \
>                             boot-certs.1.path=/root/pem-test/rsa.pem, \
>                             boot-certs.2.path=/root/pem-test/rsa-oaep.pem
> 
>    qemu-system-s390x: Failed to initialize certificate: /root/cert.pem:
> Failed to import certificate: Base64 unexpected header error.
> Using virtio-blk.
> SCSI boot device supports secure boot.
> LOADPARM=[        ]
> 
> Using virtio-blk.
> Using SCSI scheme.
> ....Verified component
> ...Verified component
> ...
> 
> In summary, QEMU first collects a list of .pem files from the CLI, and
> then validate each certificate in that list.
> 
> More specifically, QEMU first checks and normalizes the certificate
> paths - each path must be a non-empty string, must exist, and must be
> either a regular file or a directory. An invalid path will be reported
> and cause the program to terminate. Regular files with a .pem suffix, as
> well as .pem files inside directories, are added to the list.

IMHO we should be a bit more strict than this

 * If pointing to a file - loading must succeed; errors must be fatal
 * If pointing to a dir - the dir must exist, any file NOT ending in
   .pem should be ignored, any file ending in .pem must succeed, errors
   must be fatal
 * If pointing to neither a file, nor dir - must be fatal

ie we should be assuming that the configuration is expected to work, and
thus errors when loading are liable to be admin config mistakes that should
be fatal.

With regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|



  reply	other threads:[~2025-09-15 17:19 UTC|newest]

Thread overview: 64+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-18 21:42 [PATCH v5 00/29] Secure IPL Support for SCSI Scheme of virtio-blk/virtio-scsi Devices Zhuoying Cai
2025-08-18 21:42 ` [PATCH v5 01/29] Add boot-certs to s390-ccw-virtio machine type option Zhuoying Cai
2025-09-11  7:24   ` Markus Armbruster
2025-09-11 19:03     ` Zhuoying Cai
2025-09-12  6:42       ` Markus Armbruster
2025-09-12 18:05         ` Zhuoying Cai
2025-09-15  6:44           ` Markus Armbruster
2025-09-15 16:14             ` Zhuoying Cai
2025-09-15 17:18               ` Daniel P. Berrangé [this message]
2025-09-16  5:59                 ` Markus Armbruster
2025-08-18 21:42 ` [PATCH v5 02/29] crypto/x509-utils: Refactor with GNUTLS fallback Zhuoying Cai
2025-08-18 21:42 ` [PATCH v5 03/29] crypto/x509-utils: Add helper functions for certificate store Zhuoying Cai
2025-08-27 17:28   ` Daniel P. Berrangé
2025-08-27 20:13     ` Zhuoying Cai
2025-08-18 21:42 ` [PATCH v5 04/29] hw/s390x/ipl: Create " Zhuoying Cai
2025-08-26 13:40   ` Jared Rossi
2025-08-28 14:31     ` Zhuoying Cai
2025-08-27 23:14   ` Farhan Ali
2025-08-28 14:46     ` Zhuoying Cai
2025-09-02 15:15       ` Jared Rossi
2025-09-02 17:55         ` Zhuoying Cai
2025-09-09  0:54   ` Collin Walling
2025-09-10 20:43     ` Zhuoying Cai
2025-08-18 21:42 ` [PATCH v5 05/29] s390x/diag: Introduce DIAG 320 for Certificate Store Facility Zhuoying Cai
2025-09-09 14:42   ` Collin Walling
2025-08-18 21:42 ` [PATCH v5 06/29] s390x/diag: Refactor address validation check from diag308_parm_check Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 07/29] s390x/diag: Implement DIAG 320 subcode 1 Zhuoying Cai
2025-08-26 22:30   ` Jared Rossi
2025-08-27 14:35     ` Zhuoying Cai
2025-08-27 18:14       ` Collin Walling
2025-08-27 21:49   ` Farhan Ali
2025-08-27 22:01     ` Thomas Huth
2025-08-18 21:43 ` [PATCH v5 08/29] crypto/x509-utils: Add helper functions for DIAG 320 subcode 2 Zhuoying Cai
2025-08-27 17:36   ` Daniel P. Berrangé
2025-08-18 21:43 ` [PATCH v5 09/29] s390x/diag: Implement " Zhuoying Cai
2025-08-27 14:35   ` Jared Rossi
2025-08-28 15:12     ` Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 10/29] s390x/diag: Introduce DIAG 508 for secure IPL operations Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 11/29] crypto/x509-utils: Add helper functions for DIAG 508 subcode 1 Zhuoying Cai
2025-08-27 17:44   ` Daniel P. Berrangé
2025-08-18 21:43 ` [PATCH v5 12/29] s390x/diag: Implement DIAG 508 subcode 1 for signature verification Zhuoying Cai
2025-08-27 14:55   ` Jared Rossi
2025-08-27 18:08     ` Collin Walling
2025-08-27 22:18   ` Farhan Ali
2025-08-28 15:01     ` Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 13/29] pc-bios/s390-ccw: Introduce IPL Information Report Block (IIRB) Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 14/29] pc-bios/s390-ccw: Define memory for IPLB and convert IPLB to pointers Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 15/29] hw/s390x/ipl: Add IPIB flags to IPL Parameter Block Zhuoying Cai
2025-08-27 16:30   ` Jared Rossi
2025-08-18 21:43 ` [PATCH v5 16/29] hw/s390x/ipl: Set iplb->len to maximum length of " Zhuoying Cai
2025-08-27 16:33   ` Jared Rossi
2025-08-18 21:43 ` [PATCH v5 17/29] s390x: Guest support for Secure-IPL Facility Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 18/29] pc-bios/s390-ccw: Refactor zipl_run() Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 19/29] pc-bios/s390-ccw: Rework zipl_load_segment function Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 20/29] pc-bios/s390-ccw: Add signature verification for secure IPL in audit mode Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 21/29] s390x: Guest support for Secure-IPL Code Loading Attributes Facility (SCLAF) Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 22/29] pc-bios/s390-ccw: Add additional security checks for secure boot Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 23/29] Add secure-boot to s390-ccw-virtio machine type option Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 24/29] hw/s390x/ipl: Set IPIB flags for secure IPL Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 25/29] pc-bios/s390-ccw: Handle true secure IPL mode Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 26/29] pc-bios/s390-ccw: Handle secure boot with multiple boot devices Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 27/29] hw/s390x/ipl: Handle secure boot without specifying a boot device Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 28/29] docs/specs: Add secure IPL documentation Zhuoying Cai
2025-08-18 21:43 ` [PATCH v5 29/29] docs/system/s390x: " Zhuoying Cai

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=aMhKWu7i-9MgO30H@redhat.com \
    --to=berrange@redhat.com \
    --cc=alifm@linux.ibm.com \
    --cc=armbru@redhat.com \
    --cc=borntraeger@linux.ibm.com \
    --cc=david@redhat.com \
    --cc=eblake@redhat.com \
    --cc=farman@linux.ibm.com \
    --cc=iii@linux.ibm.com \
    --cc=jjherne@linux.ibm.com \
    --cc=jrossi@linux.ibm.com \
    --cc=mjrosato@linux.ibm.com \
    --cc=pasic@linux.ibm.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-s390x@nongnu.org \
    --cc=richard.henderson@linaro.org \
    --cc=thuth@redhat.com \
    --cc=walling@linux.ibm.com \
    --cc=zycai@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).