From: Ilias Apalodimas <ilias.apalodimas@linaro.org>
To: AKASHI Takahiro <takahiro.akashi@linaro.org>,
xypron.glpk@gmx.de, u-boot@lists.denx.de
Subject: Re: [PATCH 2/2] test/py: efi_secboot: adjust secure boot tests to code changes
Date: Tue, 15 Feb 2022 08:50:08 +0200 [thread overview]
Message-ID: <YgtNICWyDJwG8EWt@hades> (raw)
In-Reply-To: <20220215003046.GA38476@laputa>
Akashi-san,
> > > > > >
> > > > > > + # Try rejection in reverse order.
> > > > >
> > > > > "Reverse order" of what?
> > > >
> > > > Of the test right above
> > >
> > > Please specify the signature database, I guess "dbx"?
> > >
> > > > >
> > > > > > + u_boot_console.restart_uboot()
> > > > >
> > > > > I don't think we need 'restart' here.
> > > > > I added it in each test function (not test case), IIRC, because we didn't
> > > > > have file-based non-volatile variables at that time.
> > > >
> > > > You do. dbx already holds dbx_hash.auth and dbx1_hash.auth (in that order) at
> > > > that point. The point is cleaning up dbx and testing against dbx1_hash.
> > >
> > > Why not simply overwrite "dbx" variable?
> > > Without "-a", "env set -e" does it if it is properly signed with KEK.
> > >
> >
> > I am not sure you've understood the bug yet. If I did that, db's 1sts
> > entry would still be there. The whole point is insert dbx1_hash first.
>
> I think that I understand your intension.
>
> You meant "db's 1st entry" -> "dbx's 1st entry" in above sentence.
> Right?
Yes
>
> # That is why, in my previous comment, I asked you to specify the test case
> number and the signature database's name explicitly in a comment to avoid any
> ambiguity.
Ok. I was planning on updating some more tests, so I'll try to spit that
up there as well.
>
> When you said "in a reversed order" in your commit, I expected that either
> 1.the image(helloworld.efi) has two signatures in a reversed order, or
> (You hinted this possibility in our chat yesterday.)
> 2."db" has "db1.auth" and "db.auth" in this order, or
> 3."dbx" has "dbx_hash1.auth" and "dbx_hash.auth" in this order
> in this context, but your change didn't do neither.
>
> You intended (3). Right?
Yes, however inserting dbx_hash.auth right after dbx_hash1.auth didnt work
for me. There's something date related which prevents us from adding both
of the sha256 hashes of the certs in reverse order. However I think that
inserting dbx_hash1.auth is enough for the test purpose. The whole point
was to verify the change of the first patch, were a binary gets rejected on
ony dbx match.
>
> > The
> > easiest way to do this is on an empty database, instead of starting
> > overwriting and cleaning variables. Why is rebooting even a problem?
>
> If "dbx" is a matter, the easiest way is to simply overwrite that variable.
> (Apparently we don't need any cleanup.)
>
Ah sure, I can test that and send a patch along with some more test cases I
got in mind.
> >
> > > > >
> > > > > > + with u_boot_console.log.section('Test Case 5e'):
> > > > > > + # Test Case 5e, authenticated even if only one of signatures
> > > > > > + # is verified. Same as before but reject dbx_hash1.auth only
> > > > >
> > > > > Please specify what test case "before" means.
> > > >
> > > > The test that run right before that
> > >
> > > Please add a particular test case number to avoid any ambiguity.
> > > I believe that a test case description should be easy enough to understand
> > > and convey no ambiguity especially if there is some subtle difference
> > > between cases.
> >
> > This is exactly the test case right above with dbx1_auth inserted first. I
> > think it's fine under the current test.
>
> See my comment above.
>
> >
> > >
> > > > >
> > > > > > + output = u_boot_console.run_command_list([
> > > > > > + 'host bind 0 %s' % disk_img,
> > > > > > + 'fatload host 0:1 4000000 db.auth',
> > > > > > + 'setenv -e -nv -bs -rt -at -i 4000000:$filesize db',
> > > > > > + 'fatload host 0:1 4000000 KEK.auth',
> > > > > > + 'setenv -e -nv -bs -rt -at -i 4000000:$filesize KEK',
> > > > > > + 'fatload host 0:1 4000000 PK.auth',
> > > > > > + 'setenv -e -nv -bs -rt -at -i 4000000:$filesize PK',
> > > > > > + 'fatload host 0:1 4000000 db1.auth',
> > > > > > + 'setenv -e -nv -bs -rt -at -a -i 4000000:$filesize db',
> > > > > > + 'fatload host 0:1 4000000 dbx_hash1.auth',
> > > > > > + 'setenv -e -nv -bs -rt -at -i 4000000:$filesize dbx'])
> > > > >
> > > > > Now "db" has db.auth and db1.auth in this order and
> > > > > 'dbx" has dbx_hash1.auth.
> > > > > Is this what you intend to test?
> > > >
> > > > Yes. The patchset solved 2 bugs. One was not rejecting the image when a
> > > > single dbx entry was found. The second was that depending on the order the
> > > > image was signed and the keys inserted into dbx, the code could reject or
> > > > accept the image.
> > >
> > > Which part of "dbx" (or "db"?) is in a reverse order?
> >
> > the first tests add dbx_hash -> dbx1_hash, while the second purges the dbx
> > database and adds dbx1_hash to test against.
>
> See my comment above.
>
> -Takahiro Akashi
>
> > Regards
> > /Ilias
> > >
> > > -Takahiro Akashi
> > >
> > >
> > > > >
> > > > > -Takahiro Akashi
> > > > >
> > > > > > + assert 'Failed to set EFI variable' not in ''.join(output)
> > > > > > + output = u_boot_console.run_command_list([
> > > > > > + 'efidebug boot add -b 1 HELLO host 0:1 /helloworld.efi.signed_2sigs -s ""',
> > > > > > + 'efidebug boot next 1',
> > > > > > + 'efidebug test bootmgr'])
> > > > > > + assert '\'HELLO\' failed' in ''.join(output)
> > > > > > + assert 'efi_start_image() returned: 26' in ''.join(output)
> > > > > > +
> > > > > > def test_efi_signed_image_auth6(self, u_boot_console, efi_boot_env):
> > > > > > """
> > > > > > Test Case 6 - using digest of signed image in database
> > > > > > --
> > > > > > 2.32.0
> > > > > >
> > > >
> > > > Regards
> > > > /Ilias
next prev parent reply other threads:[~2022-02-15 6:50 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-02-11 7:37 [PATCH 1/2] efi_loader: fix dual signed image certification Ilias Apalodimas
2022-02-11 7:37 ` [PATCH 2/2] test/py: efi_secboot: adjust secure boot tests to code changes Ilias Apalodimas
2022-02-14 1:50 ` AKASHI Takahiro
2022-02-14 6:18 ` Ilias Apalodimas
2022-02-14 6:36 ` AKASHI Takahiro
2022-02-14 6:56 ` Ilias Apalodimas
2022-02-15 0:30 ` AKASHI Takahiro
2022-02-15 6:50 ` Ilias Apalodimas [this message]
2022-02-16 2:18 ` AKASHI Takahiro
2022-02-16 9:51 ` Ilias Apalodimas
2022-02-16 10:03 ` Ilias Apalodimas
2022-02-16 2:20 ` AKASHI Takahiro
2022-02-16 9:52 ` Ilias Apalodimas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YgtNICWyDJwG8EWt@hades \
--to=ilias.apalodimas@linaro.org \
--cc=takahiro.akashi@linaro.org \
--cc=u-boot@lists.denx.de \
--cc=xypron.glpk@gmx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox