differences incurred by rebasing - thanks Linus
[strongswan.git] / src / libpts / plugins / imv_attestation / imv_attestation.c
1 /*
2 * Copyright (C) 2011 Sansar Choinyambuu
3 * HSR Hochschule fuer Technik Rapperswil
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * for more details.
14 */
15
16 #include "imv_attestation_state.h"
17 #include "imv_attestation_process.h"
18 #include "imv_attestation_build.h"
19
20 #include <imv/imv_agent.h>
21 #include <pa_tnc/pa_tnc_msg.h>
22 #include <ietf/ietf_attr.h>
23 #include <ietf/ietf_attr_pa_tnc_error.h>
24 #include <ietf/ietf_attr_product_info.h>
25
26 #include <libpts.h>
27
28 #include <pts/pts.h>
29 #include <pts/pts_database.h>
30 #include <pts/pts_creds.h>
31
32 #include <tcg/tcg_attr.h>
33
34 #include <tncif_pa_subtypes.h>
35
36 #include <pen/pen.h>
37 #include <debug.h>
38 #include <credentials/credential_manager.h>
39 #include <utils/linked_list.h>
40
41 /* IMV definitions */
42
43 static const char imv_name[] = "Attestation";
44
45 #define IMV_VENDOR_ID PEN_TCG
46 #define IMV_SUBTYPE PA_SUBTYPE_TCG_PTS
47
48 static imv_agent_t *imv_attestation;
49
50 /**
51 * Supported PTS measurement algorithms
52 */
53 static pts_meas_algorithms_t supported_algorithms = PTS_MEAS_ALGO_NONE;
54
55 /**
56 * Supported PTS Diffie Hellman Groups
57 */
58 static pts_dh_group_t supported_dh_groups = PTS_DH_GROUP_NONE;
59
60 /**
61 * PTS file measurement database
62 */
63 static pts_database_t *pts_db;
64
65 /**
66 * PTS credentials
67 */
68 static pts_creds_t *pts_creds;
69
70 /**
71 * PTS credential manager
72 */
73 static credential_manager_t *pts_credmgr;
74
75 /**
76 * see section 3.7.1 of TCG TNC IF-IMV Specification 1.2
77 */
78 TNC_Result TNC_IMV_Initialize(TNC_IMVID imv_id,
79 TNC_Version min_version,
80 TNC_Version max_version,
81 TNC_Version *actual_version)
82 {
83 char *hash_alg, *dh_group, *uri, *cadir;
84
85 if (imv_attestation)
86 {
87 DBG1(DBG_IMV, "IMV \"%s\" has already been initialized", imv_name);
88 return TNC_RESULT_ALREADY_INITIALIZED;
89 }
90 if (!pts_meas_algo_probe(&supported_algorithms) ||
91 !pts_dh_group_probe(&supported_dh_groups))
92 {
93 return TNC_RESULT_FATAL;
94 }
95 imv_attestation = imv_agent_create(imv_name, IMV_VENDOR_ID, IMV_SUBTYPE,
96 imv_id, actual_version);
97 if (!imv_attestation)
98 {
99 return TNC_RESULT_FATAL;
100 }
101
102 libpts_init();
103
104 if (min_version > TNC_IFIMV_VERSION_1 || max_version < TNC_IFIMV_VERSION_1)
105 {
106 DBG1(DBG_IMV, "no common IF-IMV version");
107 return TNC_RESULT_NO_COMMON_VERSION;
108 }
109
110 hash_alg = lib->settings->get_str(lib->settings,
111 "libimcv.plugins.imv-attestation.hash_algorithm", "sha256");
112 dh_group = lib->settings->get_str(lib->settings,
113 "libimcv.plugins.imv-attestation.dh_group", "ecp256");
114
115 if (!pts_meas_algo_update(hash_alg, &supported_algorithms) ||
116 !pts_dh_group_update(dh_group, &supported_dh_groups))
117 {
118 return TNC_RESULT_FATAL;
119 }
120
121 /* create a PTS credential manager */
122 pts_credmgr = credential_manager_create();
123
124 /* create PTS credential set */
125 cadir = lib->settings->get_str(lib->settings,
126 "libimcv.plugins.imv-attestation.cadir", NULL);
127 pts_creds = pts_creds_create(cadir);
128 if (pts_creds)
129 {
130 pts_credmgr->add_set(pts_credmgr, pts_creds->get_set(pts_creds));
131 }
132
133 /* attach file measurement database */
134 uri = lib->settings->get_str(lib->settings,
135 "libimcv.plugins.imv-attestation.database", NULL);
136 pts_db = pts_database_create(uri);
137
138 return TNC_RESULT_SUCCESS;
139 }
140
141 /**
142 * see section 3.7.2 of TCG TNC IF-IMV Specification 1.2
143 */
144 TNC_Result TNC_IMV_NotifyConnectionChange(TNC_IMVID imv_id,
145 TNC_ConnectionID connection_id,
146 TNC_ConnectionState new_state)
147 {
148 imv_state_t *state;
149
150 if (!imv_attestation)
151 {
152 DBG1(DBG_IMV, "IMV \"%s\" has not been initialized", imv_name);
153 return TNC_RESULT_NOT_INITIALIZED;
154 }
155 switch (new_state)
156 {
157 case TNC_CONNECTION_STATE_CREATE:
158 state = imv_attestation_state_create(connection_id);
159 return imv_attestation->create_state(imv_attestation, state);
160 case TNC_CONNECTION_STATE_DELETE:
161 return imv_attestation->delete_state(imv_attestation, connection_id);
162 case TNC_CONNECTION_STATE_HANDSHAKE:
163 default:
164 return imv_attestation->change_state(imv_attestation, connection_id,
165 new_state, NULL);
166 }
167 }
168
169 static TNC_Result send_message(TNC_ConnectionID connection_id)
170 {
171 pa_tnc_msg_t *msg;
172 imv_state_t *state;
173 imv_attestation_state_t *attestation_state;
174 TNC_Result result;
175
176 if (!imv_attestation->get_state(imv_attestation, connection_id, &state))
177 {
178 return TNC_RESULT_FATAL;
179 }
180 attestation_state = (imv_attestation_state_t*)state;
181 msg = pa_tnc_msg_create();
182
183 if (imv_attestation_build(msg, attestation_state, supported_algorithms,
184 supported_dh_groups, pts_db))
185 {
186 msg->build(msg);
187 result = imv_attestation->send_message(imv_attestation, connection_id,
188 msg->get_encoding(msg));
189 }
190 else
191 {
192 result = TNC_RESULT_FATAL;
193 }
194 msg->destroy(msg);
195
196 return result;
197 }
198
199 /**
200 * see section 3.7.3 of TCG TNC IF-IMV Specification 1.2
201 */
202 TNC_Result TNC_IMV_ReceiveMessage(TNC_IMVID imv_id,
203 TNC_ConnectionID connection_id,
204 TNC_BufferReference msg,
205 TNC_UInt32 msg_len,
206 TNC_MessageType msg_type)
207 {
208 pa_tnc_msg_t *pa_tnc_msg;
209 pa_tnc_attr_t *attr;
210 linked_list_t *attr_list;
211 imv_state_t *state;
212 imv_attestation_state_t *attestation_state;
213 pts_t *pts;
214 enumerator_t *enumerator;
215 TNC_Result result;
216
217 if (!imv_attestation)
218 {
219 DBG1(DBG_IMV, "IMV \"%s\" has not been initialized", imv_name);
220 return TNC_RESULT_NOT_INITIALIZED;
221 }
222
223 /* get current IMV state */
224 if (!imv_attestation->get_state(imv_attestation, connection_id, &state))
225 {
226 return TNC_RESULT_FATAL;
227 }
228 attestation_state = (imv_attestation_state_t*)state;
229 pts = attestation_state->get_pts(attestation_state);
230
231 /* parse received PA-TNC message and automatically handle any errors */
232 result = imv_attestation->receive_message(imv_attestation, connection_id,
233 chunk_create(msg, msg_len), msg_type,
234 &pa_tnc_msg);
235
236 /* no parsed PA-TNC attributes available if an error occurred */
237 if (!pa_tnc_msg)
238 {
239 return result;
240 }
241
242 attr_list = linked_list_create();
243 result = TNC_RESULT_SUCCESS;
244
245 /* analyze PA-TNC attributes */
246 enumerator = pa_tnc_msg->create_attribute_enumerator(pa_tnc_msg);
247 while (enumerator->enumerate(enumerator, &attr))
248 {
249 if (attr->get_vendor_id(attr) == PEN_IETF)
250 {
251 if (attr->get_type(attr) == IETF_ATTR_PA_TNC_ERROR)
252 {
253 ietf_attr_pa_tnc_error_t *error_attr;
254 pen_t error_vendor_id;
255 pa_tnc_error_code_t error_code;
256 chunk_t msg_info, attr_info;
257 u_int32_t offset;
258
259 error_attr = (ietf_attr_pa_tnc_error_t*)attr;
260 error_vendor_id = error_attr->get_vendor_id(error_attr);
261 error_code = error_attr->get_error_code(error_attr);
262 msg_info = error_attr->get_msg_info(error_attr);
263
264 if (error_vendor_id == PEN_IETF)
265 {
266 DBG1(DBG_IMV, "received PA-TNC error '%N' "
267 "concerning message %#B",
268 pa_tnc_error_code_names, error_code, &msg_info);
269
270 switch (error_code)
271 {
272 case PA_ERROR_INVALID_PARAMETER:
273 offset = error_attr->get_offset(error_attr);
274 DBG1(DBG_IMV, " occurred at offset of %u bytes",
275 offset);
276 break;
277 case PA_ERROR_ATTR_TYPE_NOT_SUPPORTED:
278 attr_info = error_attr->get_attr_info(error_attr);
279 DBG1(DBG_IMV, " unsupported attribute %#B",
280 &attr_info);
281 break;
282 default:
283 break;
284 }
285 }
286 else if (error_vendor_id == PEN_TCG)
287 {
288 DBG1(DBG_IMV, "received TCG-PTS error '%N'",
289 pts_error_code_names, error_code);
290 DBG1(DBG_IMV, "error information: %B", &msg_info);
291 }
292 result = TNC_RESULT_FATAL;
293 }
294 else if (attr->get_type(attr) == IETF_ATTR_PRODUCT_INFORMATION)
295 {
296 ietf_attr_product_info_t *attr_cast;
297 char *platform_info;
298
299 attr_cast = (ietf_attr_product_info_t*)attr;
300 platform_info = attr_cast->get_info(attr_cast, NULL, NULL);
301 pts->set_platform_info(pts, platform_info);
302 }
303 }
304 else if (attr->get_vendor_id(attr) == PEN_TCG)
305 {
306 if (!imv_attestation_process(attr, attr_list, attestation_state,
307 supported_algorithms,supported_dh_groups, pts_db, pts_credmgr))
308 {
309 result = TNC_RESULT_FATAL;
310 break;
311 }
312 }
313 }
314 enumerator->destroy(enumerator);
315 pa_tnc_msg->destroy(pa_tnc_msg);
316
317 if (result != TNC_RESULT_SUCCESS)
318 {
319 attr_list->destroy(attr_list);
320 state->set_recommendation(state,
321 TNC_IMV_ACTION_RECOMMENDATION_NO_RECOMMENDATION,
322 TNC_IMV_EVALUATION_RESULT_ERROR);
323 return imv_attestation->provide_recommendation(imv_attestation,
324 connection_id);
325 }
326
327 if (attr_list->get_count(attr_list))
328 {
329 pa_tnc_msg = pa_tnc_msg_create();
330
331 enumerator = attr_list->create_enumerator(attr_list);
332 while (enumerator->enumerate(enumerator, &attr))
333 {
334 pa_tnc_msg->add_attribute(pa_tnc_msg, attr);
335 }
336 enumerator->destroy(enumerator);
337
338 pa_tnc_msg->build(pa_tnc_msg);
339 result = imv_attestation->send_message(imv_attestation, connection_id,
340 pa_tnc_msg->get_encoding(pa_tnc_msg));
341
342 pa_tnc_msg->destroy(pa_tnc_msg);
343 attr_list->destroy(attr_list);
344
345 return result;
346 }
347 attr_list->destroy(attr_list);
348
349 if (attestation_state->get_handshake_state(attestation_state) ==
350 IMV_ATTESTATION_STATE_END)
351 {
352 if (attestation_state->get_file_meas_request_count(attestation_state))
353 {
354 DBG1(DBG_IMV, "failure due to %d pending file measurements",
355 attestation_state->get_file_meas_request_count(attestation_state));
356 attestation_state->set_measurement_error(attestation_state);
357 }
358 if (attestation_state->get_component_count(attestation_state))
359 {
360 DBG1(DBG_IMV, "failure due to %d components waiting for evidence",
361 attestation_state->get_component_count(attestation_state));
362 attestation_state->set_measurement_error(attestation_state);
363 }
364 if (attestation_state->get_measurement_error(attestation_state))
365 {
366 state->set_recommendation(state,
367 TNC_IMV_ACTION_RECOMMENDATION_ISOLATE,
368 TNC_IMV_EVALUATION_RESULT_NONCOMPLIANT_MAJOR);
369 }
370 else
371 {
372 state->set_recommendation(state,
373 TNC_IMV_ACTION_RECOMMENDATION_ALLOW,
374 TNC_IMV_EVALUATION_RESULT_COMPLIANT);
375 }
376 return imv_attestation->provide_recommendation(imv_attestation,
377 connection_id);
378 }
379
380 return send_message(connection_id);
381 }
382
383 /**
384 * see section 3.7.4 of TCG TNC IF-IMV Specification 1.2
385 */
386 TNC_Result TNC_IMV_SolicitRecommendation(TNC_IMVID imv_id,
387 TNC_ConnectionID connection_id)
388 {
389 if (!imv_attestation)
390 {
391 DBG1(DBG_IMV, "IMV \"%s\" has not been initialized", imv_name);
392 return TNC_RESULT_NOT_INITIALIZED;
393 }
394 return imv_attestation->provide_recommendation(imv_attestation,
395 connection_id);
396 }
397
398 /**
399 * see section 3.7.5 of TCG TNC IF-IMV Specification 1.2
400 */
401 TNC_Result TNC_IMV_BatchEnding(TNC_IMVID imv_id,
402 TNC_ConnectionID connection_id)
403 {
404 imv_state_t *state;
405 imv_attestation_state_t *attestation_state;
406
407 if (!imv_attestation)
408 {
409 DBG1(DBG_IMV, "IMV \"%s\" has not been initialized", imv_name);
410 return TNC_RESULT_NOT_INITIALIZED;
411 }
412 /* get current IMV state */
413 if (!imv_attestation->get_state(imv_attestation, connection_id, &state))
414 {
415 return TNC_RESULT_FATAL;
416 }
417 attestation_state = (imv_attestation_state_t*)state;
418
419 /* Check if IMV has to initiate the PA-TNC exchange */
420 if (attestation_state->get_handshake_state(attestation_state) ==
421 IMV_ATTESTATION_STATE_INIT)
422 {
423 return send_message(connection_id);
424 }
425 return TNC_RESULT_SUCCESS;
426 }
427
428 /**
429 * see section 3.7.6 of TCG TNC IF-IMV Specification 1.2
430 */
431 TNC_Result TNC_IMV_Terminate(TNC_IMVID imv_id)
432 {
433 if (!imv_attestation)
434 {
435 DBG1(DBG_IMV, "IMV \"%s\" has not been initialized", imv_name);
436 return TNC_RESULT_NOT_INITIALIZED;
437 }
438 if (pts_creds)
439 {
440 pts_credmgr->remove_set(pts_credmgr, pts_creds->get_set(pts_creds));
441 pts_creds->destroy(pts_creds);
442 }
443 DESTROY_IF(pts_db);
444 DESTROY_IF(pts_credmgr);
445
446 libpts_deinit();
447
448 imv_attestation->destroy(imv_attestation);
449 imv_attestation = NULL;
450
451 return TNC_RESULT_SUCCESS;
452 }
453
454 /**
455 * see section 4.2.8.1 of TCG TNC IF-IMV Specification 1.2
456 */
457 TNC_Result TNC_IMV_ProvideBindFunction(TNC_IMVID imv_id,
458 TNC_TNCS_BindFunctionPointer bind_function)
459 {
460 if (!imv_attestation)
461 {
462 DBG1(DBG_IMV, "IMV \"%s\" has not been initialized", imv_name);
463 return TNC_RESULT_NOT_INITIALIZED;
464 }
465 return imv_attestation->bind_functions(imv_attestation, bind_function);
466 }