]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
nvme-tcp: request secure channel concatenation
authorHannes Reinecke <hare@kernel.org>
Mon, 24 Feb 2025 12:38:14 +0000 (13:38 +0100)
committerKeith Busch <kbusch@kernel.org>
Thu, 20 Mar 2025 23:53:54 +0000 (16:53 -0700)
Add a fabrics option 'concat' to request secure channel concatenation as
specified the NVME Base Specification v2.1, section 8.3.4.3: Secure Channel
Concatenation.
When secure channel concatenation is enabled a 'generated PSK' is inserted
into the keyring such that it's available after reset.

Signed-off-by: Hannes Reinecke <hare@kernel.org>
Reviewed-by: Sagi Grimberg <sagi@grimberg.me>
Signed-off-by: Keith Busch <kbusch@kernel.org>
drivers/nvme/host/Kconfig
drivers/nvme/host/auth.c
drivers/nvme/host/fabrics.c
drivers/nvme/host/fabrics.h
drivers/nvme/host/nvme.h
drivers/nvme/host/sysfs.c
drivers/nvme/host/tcp.c
include/linux/nvme.h

index 486afe598184545b036745dc000f23c7540ded68..10e453b2436e800bba47df3ef8dfef1bae5bb42a 100644 (file)
@@ -109,7 +109,7 @@ config NVME_HOST_AUTH
        bool "NVMe over Fabrics In-Band Authentication in host side"
        depends on NVME_CORE
        select NVME_AUTH
-       select NVME_KEYRING if NVME_TCP_TLS
+       select NVME_KEYRING
        help
          This provides support for NVMe over Fabrics In-Band Authentication in
          host side.
index 5ea0e21709da3753432a3401c40627c12436ffb5..6115fef74c1e93051d2e71a87ed5f2d39370d21f 100644 (file)
@@ -12,6 +12,7 @@
 #include "nvme.h"
 #include "fabrics.h"
 #include <linux/nvme-auth.h>
+#include <linux/nvme-keyring.h>
 
 #define CHAP_BUF_SIZE 4096
 static struct kmem_cache *nvme_chap_buf_cache;
@@ -131,7 +132,13 @@ static int nvme_auth_set_dhchap_negotiate_data(struct nvme_ctrl *ctrl,
        data->auth_type = NVME_AUTH_COMMON_MESSAGES;
        data->auth_id = NVME_AUTH_DHCHAP_MESSAGE_NEGOTIATE;
        data->t_id = cpu_to_le16(chap->transaction);
-       data->sc_c = 0; /* No secure channel concatenation */
+       if (ctrl->opts->concat && chap->qid == 0) {
+               if (ctrl->opts->tls_key)
+                       data->sc_c = NVME_AUTH_SECP_REPLACETLSPSK;
+               else
+                       data->sc_c = NVME_AUTH_SECP_NEWTLSPSK;
+       } else
+               data->sc_c = NVME_AUTH_SECP_NOSC;
        data->napd = 1;
        data->auth_protocol[0].dhchap.authid = NVME_AUTH_DHCHAP_AUTH_ID;
        data->auth_protocol[0].dhchap.halen = 3;
@@ -311,8 +318,9 @@ static int nvme_auth_set_dhchap_reply_data(struct nvme_ctrl *ctrl,
        data->hl = chap->hash_len;
        data->dhvlen = cpu_to_le16(chap->host_key_len);
        memcpy(data->rval, chap->response, chap->hash_len);
-       if (ctrl->ctrl_key) {
+       if (ctrl->ctrl_key)
                chap->bi_directional = true;
+       if (ctrl->ctrl_key || ctrl->opts->concat) {
                get_random_bytes(chap->c2, chap->hash_len);
                data->cvalid = 1;
                memcpy(data->rval + chap->hash_len, chap->c2,
@@ -322,7 +330,10 @@ static int nvme_auth_set_dhchap_reply_data(struct nvme_ctrl *ctrl,
        } else {
                memset(chap->c2, 0, chap->hash_len);
        }
-       chap->s2 = nvme_auth_get_seqnum();
+       if (ctrl->opts->concat)
+               chap->s2 = 0;
+       else
+               chap->s2 = nvme_auth_get_seqnum();
        data->seqnum = cpu_to_le32(chap->s2);
        if (chap->host_key_len) {
                dev_dbg(ctrl->device, "%s: qid %d host public key %*ph\n",
@@ -677,6 +688,92 @@ static void nvme_auth_free_dhchap(struct nvme_dhchap_queue_context *chap)
                crypto_free_kpp(chap->dh_tfm);
 }
 
+void nvme_auth_revoke_tls_key(struct nvme_ctrl *ctrl)
+{
+       dev_dbg(ctrl->device, "Wipe generated TLS PSK %08x\n",
+               key_serial(ctrl->opts->tls_key));
+       key_revoke(ctrl->opts->tls_key);
+       key_put(ctrl->opts->tls_key);
+       ctrl->opts->tls_key = NULL;
+}
+EXPORT_SYMBOL_GPL(nvme_auth_revoke_tls_key);
+
+static int nvme_auth_secure_concat(struct nvme_ctrl *ctrl,
+                                  struct nvme_dhchap_queue_context *chap)
+{
+       u8 *psk, *digest, *tls_psk;
+       struct key *tls_key;
+       size_t psk_len;
+       int ret = 0;
+
+       if (!chap->sess_key) {
+               dev_warn(ctrl->device,
+                        "%s: qid %d no session key negotiated\n",
+                        __func__, chap->qid);
+               return -ENOKEY;
+       }
+
+       if (chap->qid) {
+               dev_warn(ctrl->device,
+                        "qid %d: secure concatenation not supported on I/O queues\n",
+                        chap->qid);
+               return -EINVAL;
+       }
+       ret = nvme_auth_generate_psk(chap->hash_id, chap->sess_key,
+                                    chap->sess_key_len,
+                                    chap->c1, chap->c2,
+                                    chap->hash_len, &psk, &psk_len);
+       if (ret) {
+               dev_warn(ctrl->device,
+                        "%s: qid %d failed to generate PSK, error %d\n",
+                        __func__, chap->qid, ret);
+               return ret;
+       }
+       dev_dbg(ctrl->device,
+                 "%s: generated psk %*ph\n", __func__, (int)psk_len, psk);
+
+       ret = nvme_auth_generate_digest(chap->hash_id, psk, psk_len,
+                                       ctrl->opts->subsysnqn,
+                                       ctrl->opts->host->nqn, &digest);
+       if (ret) {
+               dev_warn(ctrl->device,
+                        "%s: qid %d failed to generate digest, error %d\n",
+                        __func__, chap->qid, ret);
+               goto out_free_psk;
+       };
+       dev_dbg(ctrl->device, "%s: generated digest %s\n",
+                __func__, digest);
+       ret = nvme_auth_derive_tls_psk(chap->hash_id, psk, psk_len,
+                                      digest, &tls_psk);
+       if (ret) {
+               dev_warn(ctrl->device,
+                        "%s: qid %d failed to derive TLS psk, error %d\n",
+                        __func__, chap->qid, ret);
+               goto out_free_digest;
+       };
+
+       tls_key = nvme_tls_psk_refresh(ctrl->opts->keyring,
+                                      ctrl->opts->host->nqn,
+                                      ctrl->opts->subsysnqn, chap->hash_id,
+                                      tls_psk, psk_len, digest);
+       if (IS_ERR(tls_key)) {
+               ret = PTR_ERR(tls_key);
+               dev_warn(ctrl->device,
+                        "%s: qid %d failed to insert generated key, error %d\n",
+                        __func__, chap->qid, ret);
+               tls_key = NULL;
+       }
+       kfree_sensitive(tls_psk);
+       if (ctrl->opts->tls_key)
+               nvme_auth_revoke_tls_key(ctrl);
+       ctrl->opts->tls_key = tls_key;
+out_free_digest:
+       kfree_sensitive(digest);
+out_free_psk:
+       kfree_sensitive(psk);
+       return ret;
+}
+
 static void nvme_queue_auth_work(struct work_struct *work)
 {
        struct nvme_dhchap_queue_context *chap =
@@ -833,6 +930,13 @@ static void nvme_queue_auth_work(struct work_struct *work)
        }
        if (!ret) {
                chap->error = 0;
+               if (ctrl->opts->concat &&
+                   (ret = nvme_auth_secure_concat(ctrl, chap))) {
+                       dev_warn(ctrl->device,
+                                "%s: qid %d failed to enable secure concatenation\n",
+                                __func__, chap->qid);
+                       chap->error = ret;
+               }
                return;
        }
 
@@ -912,6 +1016,11 @@ static void nvme_ctrl_auth_work(struct work_struct *work)
                         "qid 0: authentication failed\n");
                return;
        }
+       /*
+        * Only run authentication on the admin queue for secure concatenation.
+        */
+       if (ctrl->opts->concat)
+               return;
 
        for (q = 1; q < ctrl->queue_count; q++) {
                ret = nvme_auth_negotiate(ctrl, q);
index 432efcbf9e2f5f7be9edcd3364434d421f88c29f..93e9041b9657eb9de836a60ba5bf0c28a351cb44 100644 (file)
@@ -472,8 +472,9 @@ int nvmf_connect_admin_queue(struct nvme_ctrl *ctrl)
        result = le32_to_cpu(res.u32);
        ctrl->cntlid = result & 0xFFFF;
        if (result & (NVME_CONNECT_AUTHREQ_ATR | NVME_CONNECT_AUTHREQ_ASCR)) {
-               /* Secure concatenation is not implemented */
-               if (result & NVME_CONNECT_AUTHREQ_ASCR) {
+               /* Check for secure concatenation */
+               if ((result & NVME_CONNECT_AUTHREQ_ASCR) &&
+                   !ctrl->opts->concat) {
                        dev_warn(ctrl->device,
                                 "qid 0: secure concatenation is not supported\n");
                        ret = -EOPNOTSUPP;
@@ -550,7 +551,7 @@ int nvmf_connect_io_queue(struct nvme_ctrl *ctrl, u16 qid)
                /* Secure concatenation is not implemented */
                if (result & NVME_CONNECT_AUTHREQ_ASCR) {
                        dev_warn(ctrl->device,
-                                "qid 0: secure concatenation is not supported\n");
+                                "qid %d: secure concatenation is not supported\n", qid);
                        ret = -EOPNOTSUPP;
                        goto out_free_data;
                }
@@ -706,6 +707,7 @@ static const match_table_t opt_tokens = {
 #endif
 #ifdef CONFIG_NVME_TCP_TLS
        { NVMF_OPT_TLS,                 "tls"                   },
+       { NVMF_OPT_CONCAT,              "concat"                },
 #endif
        { NVMF_OPT_ERR,                 NULL                    }
 };
@@ -735,6 +737,7 @@ static int nvmf_parse_options(struct nvmf_ctrl_options *opts,
        opts->tls = false;
        opts->tls_key = NULL;
        opts->keyring = NULL;
+       opts->concat = false;
 
        options = o = kstrdup(buf, GFP_KERNEL);
        if (!options)
@@ -1053,6 +1056,14 @@ static int nvmf_parse_options(struct nvmf_ctrl_options *opts,
                        }
                        opts->tls = true;
                        break;
+               case NVMF_OPT_CONCAT:
+                       if (!IS_ENABLED(CONFIG_NVME_TCP_TLS)) {
+                               pr_err("TLS is not supported\n");
+                               ret = -EINVAL;
+                               goto out;
+                       }
+                       opts->concat = true;
+                       break;
                default:
                        pr_warn("unknown parameter or missing value '%s' in ctrl creation request\n",
                                p);
@@ -1079,6 +1090,23 @@ static int nvmf_parse_options(struct nvmf_ctrl_options *opts,
                        pr_warn("failfast tmo (%d) larger than controller loss tmo (%d)\n",
                                opts->fast_io_fail_tmo, ctrl_loss_tmo);
        }
+       if (opts->concat) {
+               if (opts->tls) {
+                       pr_err("Secure concatenation over TLS is not supported\n");
+                       ret = -EINVAL;
+                       goto out;
+               }
+               if (opts->tls_key) {
+                       pr_err("Cannot specify a TLS key for secure concatenation\n");
+                       ret = -EINVAL;
+                       goto out;
+               }
+               if (!opts->dhchap_secret) {
+                       pr_err("Need to enable DH-CHAP for secure concatenation\n");
+                       ret = -EINVAL;
+                       goto out;
+               }
+       }
 
        opts->host = nvmf_host_add(hostnqn, &hostid);
        if (IS_ERR(opts->host)) {
index 21d75dc4a3a09126e4a58ed0f9e3fefae692053d..9cf5b020adba27b73535590ed159c594a02e107a 100644 (file)
@@ -66,6 +66,7 @@ enum {
        NVMF_OPT_TLS            = 1 << 25,
        NVMF_OPT_KEYRING        = 1 << 26,
        NVMF_OPT_TLS_KEY        = 1 << 27,
+       NVMF_OPT_CONCAT         = 1 << 28,
 };
 
 /**
@@ -101,6 +102,7 @@ enum {
  * @keyring:    Keyring to use for key lookups
  * @tls_key:    TLS key for encrypted connections (TCP)
  * @tls:        Start TLS encrypted connections (TCP)
+ * @concat:     Enabled Secure channel concatenation (TCP)
  * @disable_sqflow: disable controller sq flow control
  * @hdr_digest: generate/verify header digest (TCP)
  * @data_digest: generate/verify data digest (TCP)
@@ -130,6 +132,7 @@ struct nvmf_ctrl_options {
        struct key              *keyring;
        struct key              *tls_key;
        bool                    tls;
+       bool                    concat;
        bool                    disable_sqflow;
        bool                    hdr_digest;
        bool                    data_digest;
index 7be92d07430e950c3faa764514daf3808009e223..daa4c91e4848ce37e54c82955501ff9ecc8ddfa6 100644 (file)
@@ -1147,6 +1147,7 @@ void nvme_auth_stop(struct nvme_ctrl *ctrl);
 int nvme_auth_negotiate(struct nvme_ctrl *ctrl, int qid);
 int nvme_auth_wait(struct nvme_ctrl *ctrl, int qid);
 void nvme_auth_free(struct nvme_ctrl *ctrl);
+void nvme_auth_revoke_tls_key(struct nvme_ctrl *ctrl);
 #else
 static inline int nvme_auth_init_ctrl(struct nvme_ctrl *ctrl)
 {
@@ -1169,6 +1170,7 @@ static inline int nvme_auth_wait(struct nvme_ctrl *ctrl, int qid)
        return -EPROTONOSUPPORT;
 }
 static inline void nvme_auth_free(struct nvme_ctrl *ctrl) {};
+static inline void nvme_auth_revoke_tls_key(struct nvme_ctrl *ctrl) {};
 #endif
 
 u32 nvme_command_effects(struct nvme_ctrl *ctrl, struct nvme_ns *ns,
index 3a41b9ab0f13c4be1ccacc5882cad5b9f0ae02ea..52683943be152f2b753a7e5ca909e45fac251aaf 100644 (file)
@@ -780,10 +780,10 @@ static umode_t nvme_tls_attrs_are_visible(struct kobject *kobj,
                return 0;
 
        if (a == &dev_attr_tls_key.attr &&
-           !ctrl->opts->tls)
+           !ctrl->opts->tls && !ctrl->opts->concat)
                return 0;
        if (a == &dev_attr_tls_configured_key.attr &&
-           !ctrl->opts->tls_key)
+           (!ctrl->opts->tls_key || ctrl->opts->concat))
                return 0;
        if (a == &dev_attr_tls_keyring.attr &&
            !ctrl->opts->keyring)
index b50972257e49d4daf055d4a488719d22899ad37c..196d363188539990aa22b1fd7ae9c99a284edc6f 100644 (file)
@@ -235,7 +235,7 @@ static inline bool nvme_tcp_tls_configured(struct nvme_ctrl *ctrl)
        if (!IS_ENABLED(CONFIG_NVME_TCP_TLS))
                return 0;
 
-       return ctrl->opts->tls;
+       return ctrl->opts->tls || ctrl->opts->concat;
 }
 
 static inline struct blk_mq_tags *nvme_tcp_tagset(struct nvme_tcp_queue *queue)
@@ -1987,7 +1987,7 @@ static int nvme_tcp_alloc_admin_queue(struct nvme_ctrl *ctrl)
        if (nvme_tcp_tls_configured(ctrl)) {
                if (ctrl->opts->tls_key)
                        pskid = key_serial(ctrl->opts->tls_key);
-               else {
+               else if (ctrl->opts->tls) {
                        pskid = nvme_tls_psk_default(ctrl->opts->keyring,
                                                      ctrl->opts->host->nqn,
                                                      ctrl->opts->subsysnqn);
@@ -2017,9 +2017,25 @@ static int __nvme_tcp_alloc_io_queues(struct nvme_ctrl *ctrl)
 {
        int i, ret;
 
-       if (nvme_tcp_tls_configured(ctrl) && !ctrl->tls_pskid) {
-               dev_err(ctrl->device, "no PSK negotiated\n");
-               return -ENOKEY;
+       if (nvme_tcp_tls_configured(ctrl)) {
+               if (ctrl->opts->concat) {
+                       /*
+                        * The generated PSK is stored in the
+                        * fabric options
+                        */
+                       if (!ctrl->opts->tls_key) {
+                               dev_err(ctrl->device, "no PSK generated\n");
+                               return -ENOKEY;
+                       }
+                       if (ctrl->tls_pskid &&
+                           ctrl->tls_pskid != key_serial(ctrl->opts->tls_key)) {
+                               dev_err(ctrl->device, "Stale PSK id %08x\n", ctrl->tls_pskid);
+                               ctrl->tls_pskid = 0;
+                       }
+               } else if (!ctrl->tls_pskid) {
+                       dev_err(ctrl->device, "no PSK negotiated\n");
+                       return -ENOKEY;
+               }
        }
 
        for (i = 1; i < ctrl->queue_count; i++) {
@@ -2237,6 +2253,27 @@ static void nvme_tcp_reconnect_or_remove(struct nvme_ctrl *ctrl,
        }
 }
 
+/*
+ * The TLS key is set by secure concatenation after negotiation has been
+ * completed on the admin queue. We need to revoke the key when:
+ * - concatenation is enabled (otherwise it's a static key set by the user)
+ * and
+ * - the generated key is present in ctrl->tls_key (otherwise there's nothing
+ *   to revoke)
+ * and
+ * - a valid PSK key ID has been set in ctrl->tls_pskid (otherwise TLS
+ *   negotiation has not run).
+ *
+ * We cannot always revoke the key as nvme_tcp_alloc_admin_queue() is called
+ * twice during secure concatenation, once on a 'normal' connection to run the
+ * DH-HMAC-CHAP negotiation (which generates the key, so it _must not_ be set),
+ * and once after the negotiation (which uses the key, so it _must_ be set).
+ */
+static bool nvme_tcp_key_revoke_needed(struct nvme_ctrl *ctrl)
+{
+       return ctrl->opts->concat && ctrl->opts->tls_key && ctrl->tls_pskid;
+}
+
 static int nvme_tcp_setup_ctrl(struct nvme_ctrl *ctrl, bool new)
 {
        struct nvmf_ctrl_options *opts = ctrl->opts;
@@ -2342,6 +2379,8 @@ static void nvme_tcp_error_recovery_work(struct work_struct *work)
                                struct nvme_tcp_ctrl, err_work);
        struct nvme_ctrl *ctrl = &tcp_ctrl->ctrl;
 
+       if (nvme_tcp_key_revoke_needed(ctrl))
+               nvme_auth_revoke_tls_key(ctrl);
        nvme_stop_keep_alive(ctrl);
        flush_work(&ctrl->async_event_work);
        nvme_tcp_teardown_io_queues(ctrl, false);
@@ -2382,6 +2421,8 @@ static void nvme_reset_ctrl_work(struct work_struct *work)
                container_of(work, struct nvme_ctrl, reset_work);
        int ret;
 
+       if (nvme_tcp_key_revoke_needed(ctrl))
+               nvme_auth_revoke_tls_key(ctrl);
        nvme_stop_ctrl(ctrl);
        nvme_tcp_teardown_ctrl(ctrl, false);
 
@@ -2877,7 +2918,7 @@ static struct nvmf_transport_ops nvme_tcp_transport = {
                          NVMF_OPT_HDR_DIGEST | NVMF_OPT_DATA_DIGEST |
                          NVMF_OPT_NR_WRITE_QUEUES | NVMF_OPT_NR_POLL_QUEUES |
                          NVMF_OPT_TOS | NVMF_OPT_HOST_IFACE | NVMF_OPT_TLS |
-                         NVMF_OPT_KEYRING | NVMF_OPT_TLS_KEY,
+                         NVMF_OPT_KEYRING | NVMF_OPT_TLS_KEY | NVMF_OPT_CONCAT,
        .create_ctrl    = nvme_tcp_create_ctrl,
 };
 
index fe3b60818fdcfbb4baabce59f7499bc1fa07e855..bfb5688363b0dc70c54824c795836262cfa462b4 100644 (file)
@@ -1746,6 +1746,13 @@ enum {
        NVME_AUTH_DHGROUP_INVALID       = 0xff,
 };
 
+enum {
+       NVME_AUTH_SECP_NOSC             = 0x00,
+       NVME_AUTH_SECP_SC               = 0x01,
+       NVME_AUTH_SECP_NEWTLSPSK        = 0x02,
+       NVME_AUTH_SECP_REPLACETLSPSK    = 0x03,
+};
+
 union nvmf_auth_protocol {
        struct nvmf_auth_dhchap_protocol_descriptor dhchap;
 };