]> git.ipfire.org Git - thirdparty/grub.git/commitdiff
diskfilter: Look up cryptodisk devices first
authorGary Lin <glin@suse.com>
Fri, 15 Nov 2024 07:34:58 +0000 (15:34 +0800)
committerDaniel Kiper <daniel.kiper@oracle.com>
Thu, 28 Nov 2024 20:50:56 +0000 (21:50 +0100)
When using disk auto-unlocking with TPM 2.0, the typical grub.cfg may
look like this:

  tpm2_key_protector_init --tpm2key=(hd0,gpt1)/boot/grub/sealed.tpm
  cryptomount -u <PART-UUID> -P tpm2
  search --fs-uuid --set=root <FS-UUID>

Since the disk search order is based on the order of module loading, the
attacker could insert a malicious disk with the same FS-UUID root to
trick GRUB to boot into the malicious root and further dump memory to
steal the unsealed key.

Do defend against such an attack, we can specify the hint provided by
"grub-probe" to search the encrypted partition first:

  search --fs-uuid --set=root --hint='cryptouuid/<PART-UUID>' <FS-UUID>

However, for LVM on an encrypted partition, the search hint provided by
"grub-probe" is:

  --hint='lvmid/<VG-UUID>/<LV-UUID>'

It doesn't guarantee to look up the logical volume from the encrypted
partition, so the attacker may have the chance to fool GRUB to boot
into the malicious disk.

To minimize the attack surface, this commit tweaks the disk device search
in diskfilter to look up cryptodisk devices first and then others, so
that the auto-unlocked disk will be found first, not the attacker's disk.

Cc: Fabian Vogt <fvogt@suse.com>
Signed-off-by: Gary Lin <glin@suse.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
Tested-by: Stefan Berger <stefanb@linux.ibm.com>
grub-core/disk/diskfilter.c

index 21e2395111a77d542a748df7d27a7f04d32c20d0..606195c26e7c571102459c068daa86966faa59db 100644 (file)
@@ -226,15 +226,28 @@ scan_devices (const char *arname)
   int need_rescan;
 
   for (pull = 0; pull < GRUB_DISK_PULL_MAX; pull++)
-    for (p = grub_disk_dev_list; p; p = p->next)
-      if (p->id != GRUB_DISK_DEVICE_DISKFILTER_ID
-         && p->disk_iterate)
-       {
-         if ((p->disk_iterate) (scan_disk_hook, NULL, pull))
-           return;
-         if (arname && is_lv_readable (find_lv (arname), 1))
-           return;
-       }
+    {
+      /* look up the crytodisk devices first */
+      for (p = grub_disk_dev_list; p; p = p->next)
+       if (p->id == GRUB_DISK_DEVICE_CRYPTODISK_ID && p->disk_iterate)
+         {
+           if ((p->disk_iterate) (scan_disk_hook, NULL, pull))
+             return;
+           if (arname && is_lv_readable (find_lv (arname), 1))
+             return;
+           break;
+         }
+
+      /* check the devices other than crytodisk */
+      for (p = grub_disk_dev_list; p; p = p->next)
+       if (p->id != GRUB_DISK_DEVICE_DISKFILTER_ID && p->disk_iterate)
+         {
+           if ((p->disk_iterate) (scan_disk_hook, NULL, pull))
+             return;
+           if (arname && is_lv_readable (find_lv (arname), 1))
+             return;
+         }
+    }
 
   scan_depth = 0;
   need_rescan = 1;