forked from open-power/secvarctl
-
Notifications
You must be signed in to change notification settings - Fork 0
/
secvarctl.1
469 lines (457 loc) · 15.5 KB
/
secvarctl.1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
.TH secvarctl 1 "1 OCTOBER 2020" "version 0.3"
.SH NAME
.B secvarctl
- A command line tool for simplifying the reading and writing of secure boot variables.
.PP
Commands are:
.RS
.B read
- read from the secure variable directory and print out information on their current contents
.PP
.B write
- update the given variable's key value
.PP
.B validate
- checks that the format and basic content requirements are met for the given file type
.PP
.B verify
- checks that the given files are correctly signed by the current variables
.PP
.B generate
- generates several different types of file formats relevant to updating secure variables
.RE
.SH SYNOPSIS
.B secvarctl
[OPTIONS]
.PP
.B secvarctl read
[OPTIONS] <variable>
.PP
.B secvarctl write
[OPTIONS] <variable> <file>
.PP
.B secvarctl validate
[OPTIONS] <file type> <file>
.PP
.B secvarctl verify
[OPTIONS] -u {Update Variables}
.PP
.B secvarctl generate
<inputFormat>:<outputFormat> [OPTIONS] -i <inputFile> -o <outputFile>
.PP
.B secvarctl generate reset
[OPTIONS] -o <outputFile> -k <key> -c <crt> -n <variable>
.SH DESCRIPTION
.B secvarctl
is a suite of tools to manipulate secure boot keys on POWER.
The purpose of this tool is to simplify and automate the process of reading, writing and generating secure boot keys. It allows the user to communicate, via terminal commands, with the keys efficiently. These commands are (
.B read
,
.B write
,
.B validate
,
.B verify
,
.B generate
)
.RS
.B secvarctl read
will read from the secure variable directory and print out information on their current contents. By default, the program assumes the data is an EFI Signature List and prints the contents in human readable form.
To print the raw data, use
.B -r
The default secure variable directiory is
.I "/sys/firmware/secvar/vars/"
defined in
.I secvarctl.h
To specify a path to the variables, use
.B -p
<newPath>.Expected variable subdirectory names :{"PK", "KEK", "db", "dbx", "TS"} with contained data file "<varName>/data".
If no variable name is given, the program will try to print the data for any variable named one of the following {'PK','KEK','db','dbx', 'TS'}
NOTE 'TS' variable is not an ESL, it is 4 timestamps (64 bytes total) for each of the other variables
Type one of the variable names to get info on that key, NOTE does not work when
.B -f
option is present
To read the data of any esl file use
.B -f
<eslFileName>
.PP
.B secvarctl write
will update the given variable's key value.
The new key value is expected to be contained in a PKCS7/Signed Data Authenticated file signed with the current key.
By default, the write function will validate the contents of the auth file. If it is a success the file will be written to the variables "update" file.
The "update" file is expected to be in "<pathToVars>/<variable>/update".
The
.B -p
<pathToVars> option is the location of the subdirectories {"PK","KEK", "db", "dbx"} which contain an "update" file, the default path is
.I "/sys/firmware/secvar/vars/"
defined in
.I secvarctl.h
The
.B -v
option prints process info
The
.B -f
option skips the validation step and immediadetly writes content of "<file>" to "<variable/upate"
The <variable> requirement is expected to be one of the following {"PK","KEK", "db", "dbx"}
.PP
.B secvarctl validate
will determine if the format and basic content requirements are met for the given file
The default type of "<file>" is an auth file containing a PKCS7/Signed Data and attatched esl.
ALL KEYS ARE EXPECTED TO BE SHA-256 and RSA 2048
THIS FUNCTION DOES NOT DO ANY COMPARISON AGAINST CURRENT KEYS (use
.B verify
for that)
For extra process and file content information use
.B -v
for verbose
To validate a file that contains update data for the dbx variable use
.B -x
To validate a PKCS7 (expected DER), use
.B -p
<file>
To validate an Efi Signature List (ESL), use
.B -e
<file>
To validate a certificate (x509 in DER or PEM format), use
.B -c
<file>
.PP
.B secvarctl verify
will determine if the update files are correctly signed by the current variables or not.
The
.B -v
command will give extra information on process information.
All given update files are expected to be a signed PKCS7/Signed Data authenticated file containing an attatched new ESL.
The updates should be signed according to the correct hierarchy rules:
.RS
--PK can sign all other keys, (including itself),
--KEK can sign db and dbx, cannot sign PK
--db/dbx cannot sign KEK or PK
--TS holds no power of the variables, only functions to hold the timestamps of the last update for each of the other variables. Cannot be manually updated
.RE
All updates have their format validated before any verification is done.
The
.B -p
<pathToVars> option is used to set the location of current variables with subdirectories {"PK","KEK", "db", "dbx", "TS"} which contain the {"update, "data", "size"} files, the default path is
.I "/sys/firmware/secvar/vars/"
defined in
.I secvarctl.h
The
.B -c
{Current Variables} option is used to specify the current variables manually. See OPTIONS for correct format of {Current variables}.
If the
.B -w
option is given then, if the verification passes, the updates will be commited to the "update" file of the given variable
.PP
.B secvarctl generate
will use the given input file to generate the output file of the given file format type.
The
.B -v
option will give more process information.
To specify the desired input and output format the user must use the argument
.B <inputFormat>:<outputFormat>
with no spaces between the colon and the format types.
The accepted values for <inputFormat> are:
.RS
[h]ash , A file containing only hashed data, use -h <hashAlg> to specifify the hash function used (default SHA256)
[c]ert , An x509 certificate (PEM), RSA2048 and SHA256 ONLY
[e]sl , An EFI Signature List
[p]kcs7 , a PKCS7 file containing signed data
[a]uth , A signed authensticated file containing a PKCS7 and the new data
[f]ile , Any file type, Warning: no format validation will be done
.RE
The accepted values for <outputFormat> are:
.RS
[h]ash , A file containing only hashed data, use -h <hashAlg> to specifify the hash function used (default SHA256)
[e]sl , An EFI Signature List
[p]kcs7 , a PKCS7 file containing signed data, must specify public and private keys and digest algorithm (default SHA256)
[a]uth , A signed authenticated file containing a PKCS7 and the new data, must specify public and private keys, digest algorithm (default SHA256) and secure variable name
[x] A presigned digest file containing only the hash of the new data in ESL format with extra metadata. This format need only be used when the user does not have access to private keys for signing and must send the digest to be signed through an external framework.
.RE
All input formats besides [f]ile will be prevalidated. To skip prevalidation of the input file, use
.B -f
to force to generation. If [h]ash is input or output type be sure to specify the hashing algorithm to use by using the argument
.B -h
<hashAlg>. This argument does not effect the digest algortithm of the signed data in a [p]kcs7 or [a]uth file, these will always use SHA256.
Accepted values for <hashAlg> are one of {'SHA256', 'SHA224', 'SHA1', 'SHA384', 'SHA512'}
Additionally, when the output type is [p]kcs7 or [a]uth, the user must give at least one pair of public and private keys
.B -c
<cert>
.B -k
<privKey> to sign the input file with. However, if the user does not have access to their private keys and are only able to interact with a signing framework, they can use
.B -s
<sigFile> in replacement of the private key argument. <sigFile> would contain only the raw signed data of a digest generated with `secvarctl generate c:x`, it is important that both these commands use the same custom timestamp argument
.B -t
<YYYY-MM-DDThh:mm:ss>.
When generating an [a]uth file, it is required the user give the secure variable name that the auth file is for,
.B -n
<varName> , where <varName> is one of {"PK","KEK", "db", "dbx"}. This argument is also useful when the input file is an ESL for the dbx (use
.B -n
dbx) because then the prevalidation will look for an ESL containing a hash rather than an x509.
Also, when the output type is a [p]kcs7 or [a]uth file, the user can use a custom timestamp with
.B -t
<time> , where <time> is in the format 'YYYY-MM-DDThh:mm:ss'. If this argument is not used then the current date and time are used.
When using the input type '[f]ile' it will be assumed to be a text file and if output file is '[e]sl', '[p]kcs7' or '[a]uth' it will be hashed according to <hashAlg> (default SHA256).
To make a variable reset file, the user can replace
.B generate <inputFormat>:<outputFormat>
with
.B generate reset
This will generate an auth file around an empty ESL. Thus, no input argument
.B -i
is required when making a reset file.
NOTE: GENERATION OF PKCS7 AND AUTH FILES ARE IN EXPERIMENTAL DEVELEPOMENT PHASE. THEY HAVE NOT BEEN THOROUGHLY TESTED YET.
.RE
.SH OPTIONS
For
.B secvarctl
[OPTIONS]:
.RS
.B --usage
.PP
.B --help
.RE
.PP
For
.B secvarctl read
[OPTIONS] <variable>:
.RS
.B --usage
.PP
.B --help
.PP
.B -r
, raw output
.PP
.B -f
<input.esl> , read from file
.PP
.B -p
</path/to/vars/> , read from path (subdirectories {"PK", "KEK, "db", "dbx", "TS"} each with files {"data", "size"} expected)
.PP
<variable> , one of {"PK", "KEK, "db", "dbx", "TS"}
.RE
.PP
For
.B secvarctl write
[OPTIONS] <variable> <file>:
.RS
REQUIRED:
.RS
<variable> , one of {"PK", "KEK, "db", "dbx"}
.PP
<file> , an auth file
.RE
OPTIONS:
.RS
.B --usage
.PP
.B --help
.PP
.B -v
, verbose output
.PP
.B -f
, force update, no validation
.PP
.B -p
</path/to/vars/> , write to file in path (subdirectories {"PK", "KEK, "db", "dbx"} each with "update" file expected)
.RE
.RE
.PP
For
.B secvarctl validate
[OPTIONS] <file type> <file>:
.RS
REQUIRED:
.RS
<file> , the input file, assumed to be auth file if not specified
.RE
OPTIONS:
.RS
.B --usage
.PP
.B --help
.PP
.B -v
, verbose output
.PP
.B -x
, dbx file (contains hash not x509)
.PP
.B -e
<file> , ESL
.PP
.B -p
<file> , PKCS7/Signed Data
.PP
.B -c
<file> , DER or PEM certificate
.PP
.B -a
<file>, DEFAULT, a signed authenticated file containg a pkcs7 and appended ESL
.RE
.RE
.PP
For
.B secvarctl verify
[OPTIONS] -u {Update Variables}:
.RS
REQUIRED:
.RS
.B -u
{Update Variables} , the updates to be run
.RE
OPTIONAL:
.RS
.B --usage
.PP
.B --help
.PP
.B -v
, verbose output
.PP
.B -p
</path/to/vars/>, read from path (subdirectories {"PK", "KEK, "db", "dbx", "TS"} each with files {"data", "size"} expected)
.PP
.B -w
, write updates if verified
.PP
.B -c
{Current Variables} , list of current variables
.RE
{Update Variables}:
.RS
Format: <varname_1> <file_1> <varname_2> <file_2> ...
Where <varname> is one of {"PK", "KEK, "db", "dbx"} and <file> is an auth file
Note: Updates are verified in the order they are submitted
.RE
{Current Variables}:
.RS
Format: <varname_1> <file_1> <varname_2> <file_2> ...
Where <varname> is one of {"PK", "KEK, "db", "dbx", "TS"} and <file> is an esl file (unless TS)
.RE
.RE
.PP
For
.B secvarctl generate
<inputFormat>:<outputFormat> [OPTIONS] -i <inputFile> -o <outputFile> :
.RS
REQUIRED:
.RS
.B <inputFormat>:<outputFormat>
, {'[c]ert', '[h]ash', '[e]sl', '[p]kcs7', '[a]uth', '[f]ile'}:{ '[h]ash', '[e]sl', '[p]kcs7', '[a]uth', '[x] presigned digest'} SEE DESCRIPTION FOR HELP
.PP
.B -i
<inputFile> , input file that has the format specified by <inputFormat>
.PP
.B -o
<outputFile> , output file that will have the format specified by <outputFormat>
.RE
OPTIONAL:
.RS
.B --usage
.PP
.B --help
.PP
.B -v
, verbose output
.PP
.B -f
, force generation, skips validation of input file and assumes it to be formatted according to <inputFormat>
.PP
.B -n
<varName> , name of secure boot variable, used when generating an auth file, PKCS7, or when the input file contains hashed data rather than x509 (use '-n dbx'), current <varName> are: {'PK','KEK','db','dbx'}
.PP
.B -t
<time> , where <time> is of the format described below. creates a custom timestamp used when generating an auth or PKCS7 file, if not given then current time is used, all times are in UTC
.RS
format of <time> = 'YYYY-MM-DDThh:mm:ss' where:
.RS
- 'YYYY' four-digit year
- 'MM' two-digit month (01=January, etc.)
- 'DD' two-digit day of month (01 through 31)
- 'T' appears literally
- 'hh' two digits of hour (00 through 23) (am/pm NOT allowed)
- 'mm' two digits of minute (00 through 59)
- 'ss' two digits of second (00 through 59)
.RE
.RE
.PP
.B -h
<hashAlg> , hash function, used when output or input format is hash, current values for <hashAlg> are : {'SHA256', 'SHA224', 'SHA1', 'SHA384', 'SHA512'}
.PP
.B -k
<privKey> , private key, used when generating pkcs7 or auth file
.PP
.B -s
<sigFile> , signed data file, alternative to internal signing, replacement of private key argument
.PP
.B -c
<certFile> , x509 certificate (PEM), used when generating pkcs7 or auth file
.PP
.B reset
, replaces
.B <inputFormat>:<outputFormat>
and generates an auth file with an empty ESL (a valid variable reset file), no input file required. Required arguments are output file, signer public and private key and variable name.
.RE
.RE
.SH EXAMPLES
To read all current variables in default path:
$secvarctl read
.PP
To read the raw data of the PK in a specific location:
$secvarctl read -p /home/user1/myVars/ -r PK
.PP
To validate and write an auth file to the default KEK location:
$secvarctl write KEK updateFile.auth
.PP
To write to /home/user1/myVars/KEK/update with no formatting checks:
$secvarctl write -p /home/user1/ -f KEK updateFile.auth
.PP
To validate the format of an auth file:
$secvarctl validate authFile.auth
.PP
To validate the format of a ESL with extra process info:
$secvarctl validate -e eslFile.esl -v
.PP
To verify the desired updates against the default path and, if successful, commit the updates:
$secvarctl verify -w -u db dbUpdate.auth KEK kekUpdate.auth
.PP
To verify the desired updates against a specific set of signers with extra process info:
$secvarctl verify -v -c PK myPK.esl KEK myKEK.esl dbx myDBX.esl -u DB dbUpdate.auth PK pkUpdate.auth
.PP
To get the attatched ESL from an auth file:
$secvarctl generate a:e -i file.auth -o file.esl
.PP
To create an ESL from an x509 certificate:
$secvarctl generate c:e -i file.pem -o file.esl
.PP
To create SHA512 from a file:
$secvarctl generate f:h -h SHA512 -i file.txt -o file.hash
.PP
To create ESL from a hash:
$secvarctl generate h:e -h 512 -i file.has -o file.esl
.PP
To create an auth file from the esl containg a hash for a dbx update:
$secvarctl generate e:a -k signer.key -c signer.crt -n dbx -i file.esl -o file.auth
.PP
To create an auth file from a certificate for a KEK update (this will create an ESL from the certificate and use the ESL for the Auth File):
$secvarctl generate c:a -k signer.key -c signer.crt -n KEK -i file.crt -o file.auth
.PP
To create a PKCS7 file from an ESL for a db update with a custom timestamp:
$secvarctl generate e:p -k signer.key -c signer.crt -n db -t 2020-10-1T13:45:42 -i file.crt -o file.pkcs7
.PP
To create an empty update to reset the db variable:
$secvarctl generate reset -k signer.key -c signer.crt -n db -o db.auth
.PP
To create an auth file using an external signing framework for db update:
$secvarctl generate c:x -n db -t 2021-1-1T1:1:1 -i file.crt -o file.hash
<user sends file.hash to be signed by external entity, signature is now in file.sig>
$secvarctl generate c:a -n db -t 2021-1-1T1:1:1 -c signer.crt -s file.sig -i file.crt -o file.auth
.SH AUTHOR
Nick Child nick.child@ibm.com,
.PP
Eric Richter,
.PP
Nayna Jain