1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341
|
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Package validate provides the library functions to validate a TDX quote
package validate
import (
"bytes"
"encoding/binary"
"encoding/hex"
"fmt"
"github.com/google/go-tdx-guest/abi"
ccpb "github.com/google/go-tdx-guest/proto/checkconfig"
pb "github.com/google/go-tdx-guest/proto/tdx"
vr "github.com/google/go-tdx-guest/verify"
"github.com/google/logger"
"go.uber.org/multierr"
)
const (
// If bit X is 1 in xfamFixed1, it must be 1 in any xfam.
xfamFixed1 = 0x00000003
// If bit X is 0 in xfamFixed0, it must be 0 in any xfam.
xfamFixed0 = 0x0006DBE7
// If bit X is 1 in tdAttributesFixed1, it must be 1 in any tdAttributes.
tdAttributesFixed1 = 0x0
tdxAttributesSeptVeDisSupport = 1 << 28
tdxAttributesPksSupport = 1 << 30
tdxAttributesPerfmonSupport = 1 << 63
// Supported ATTRIBUTES bits depend on the supported features - bits 0 (DEBUG), 30 (PKS), 63 (PERFMON)
// and 28 (SEPT VE DISABLE)
// If bit X is 0 in tdAttributesFixed0, it must be 0 in any tdAttributes.
tdAttributesFixed0 = 0x1 | tdxAttributesSeptVeDisSupport | tdxAttributesPksSupport | tdxAttributesPerfmonSupport
rtmrsCount = 4
)
// Options represents validation options for a TDX attestation Quote.
type Options struct {
HeaderOptions HeaderOptions
TdQuoteBodyOptions TdQuoteBodyOptions
}
// HeaderOptions represents validation options for a TDX attestation Quote Header.
type HeaderOptions struct {
// MinimumQeSvn is the minimum QE security version number. Not checked if nil.
MinimumQeSvn uint16
// MinimumPceSvn is the minimum PCE security version number. Not checked if nil.
MinimumPceSvn uint16
// QeVendorID is the expected QE_VENDOR_ID field. Must be nil or 16 bytes long. Not checked if nil.
QeVendorID []byte
}
// TdQuoteBodyOptions represents validation options for a TDX attestation Quote's TD Quote body.
type TdQuoteBodyOptions struct {
// MinimumTeeTcbSvn is the component-wise minimum TEE_TCB security version number. Must be nil or 16 bytes long. Not checked if nil.
MinimumTeeTcbSvn []byte
// MrSeam is the expected MR_SEAM field. Must be nil or 48 bytes long. Not checked if nil.
MrSeam []byte
// TdAttributes is the expected TD_ATTRIBUTES field. Must be nil or 8 bytes long. Not checked if nil.
TdAttributes []byte
// Xfam is the expected XFAM field. Must be nil or 8 bytes long. Not checked if nil.
Xfam []byte
// MrTd is the expected MR_TD field. Must be nil or 48 bytes long. Not checked if nil.
MrTd []byte
// MrConfigID is the expected MR_CONFIG_ID field. Must be nil or 48 bytes long. Not checked if nil.
MrConfigID []byte
// MrOwner is the expected MR_OWNER field. Must be nil or 48 bytes long. Not checked if nil.
MrOwner []byte
// MrOwnerConfig is the expected MR_OWNER_CONFIG field. Must be nil or 48 bytes long. Not checked if nil.
MrOwnerConfig []byte
// Rtmrs is the expected RTMRS field. Must be nil or 48 * rtmrsCount. Not checked if nil.
Rtmrs [][]byte
// ReportData is the expected REPORT_DATA field. Must be nil or 64 bytes long. Not checked if nil.
ReportData []byte
}
func lengthCheck(name string, length int, value []byte) error {
if value != nil && len(value) != length {
return fmt.Errorf("option %q length is %d. Want %d", name, len(value), length)
}
return nil
}
func lengthCheckRtmr(name string, size int, length int, value [][]byte) error {
if len(value) == 0 {
return nil
}
if len(value) != size {
return fmt.Errorf("option %q size is %d. Want %d", name, len(value), size)
}
for i := range value {
if len(value[i]) != 0 && len(value[i]) != length {
return fmt.Errorf("option %q[%d] length is %d. Want %d", name, i, len(value), length)
}
}
return nil
}
func checkOptionsLengths(opts *Options) error {
return multierr.Combine(
lengthCheck("mr_seam", abi.MrSeamSize, opts.TdQuoteBodyOptions.MrSeam),
lengthCheck("td_attributes", abi.TdAttributesSize, opts.TdQuoteBodyOptions.TdAttributes),
lengthCheck("xfam", abi.XfamSize, opts.TdQuoteBodyOptions.Xfam),
lengthCheck("mr_td", abi.MrTdSize, opts.TdQuoteBodyOptions.MrTd),
lengthCheck("mr_config_id", abi.MrConfigIDSize, opts.TdQuoteBodyOptions.MrConfigID),
lengthCheck("mr_owner", abi.MrOwnerSize, opts.TdQuoteBodyOptions.MrOwner),
lengthCheck("mr_owner_config", abi.MrOwnerConfigSize, opts.TdQuoteBodyOptions.MrOwnerConfig),
lengthCheck("report_data", abi.ReportDataSize, opts.TdQuoteBodyOptions.ReportData),
lengthCheck("qe_vendor_id", abi.QeVendorIDSize, opts.HeaderOptions.QeVendorID),
lengthCheckRtmr("rtmrs", rtmrsCount, abi.RtmrSize, opts.TdQuoteBodyOptions.Rtmrs),
)
}
// PolicyToOptions returns an Options object that is represented by a Policy message.
func PolicyToOptions(policy *ccpb.Policy) (*Options, error) {
if policy.GetHeaderPolicy().GetMinimumQeSvn() > 65535 {
return nil, fmt.Errorf("minimum_qe_svn is %d. Expect 0-65535", policy.GetHeaderPolicy().GetMinimumQeSvn())
}
if policy.GetHeaderPolicy().GetMinimumPceSvn() > 65535 {
return nil, fmt.Errorf("minimum_pce_svn is %d. Expect 0-65535", policy.GetHeaderPolicy().GetMinimumPceSvn())
}
opts := &Options{
HeaderOptions: HeaderOptions{
MinimumQeSvn: uint16(policy.GetHeaderPolicy().GetMinimumQeSvn()),
MinimumPceSvn: uint16(policy.GetHeaderPolicy().GetMinimumPceSvn()),
QeVendorID: policy.GetHeaderPolicy().GetQeVendorId(),
},
TdQuoteBodyOptions: TdQuoteBodyOptions{
MinimumTeeTcbSvn: policy.GetTdQuoteBodyPolicy().GetMinimumTeeTcbSvn(),
MrSeam: policy.GetTdQuoteBodyPolicy().GetMrSeam(),
TdAttributes: policy.GetTdQuoteBodyPolicy().GetTdAttributes(),
Xfam: policy.GetTdQuoteBodyPolicy().GetXfam(),
MrTd: policy.GetTdQuoteBodyPolicy().GetMrTd(),
MrConfigID: policy.GetTdQuoteBodyPolicy().GetMrConfigId(),
MrOwner: policy.GetTdQuoteBodyPolicy().GetMrOwner(),
MrOwnerConfig: policy.GetTdQuoteBodyPolicy().GetMrOwnerConfig(),
Rtmrs: policy.GetTdQuoteBodyPolicy().GetRtmrs(),
ReportData: policy.GetTdQuoteBodyPolicy().GetReportData(),
},
}
if err := checkOptionsLengths(opts); err != nil {
return nil, err
}
return opts, nil
}
func byteCheckRtmr(size int, given, required [][]byte) error {
if len(required) == 0 {
logger.V(1).Info("Skipping validation check for RTMRs field: input provided is nil")
return nil
}
if len(required) != rtmrsCount {
return fmt.Errorf("RTMR field size(%d) is not equal to expected size(4)", len(required))
}
for i := range required {
if len(required[i]) == 0 {
logger.V(1).Infof("Skipping validation check for RTMR[%d] field: input provided is nil", i+1)
continue
}
if len(required[i]) != size {
return fmt.Errorf("RTMR[%d] should be 48 bytes, found %d", i, len(required[i]))
}
logger.V(2).Infof("Quote field RTMR[%d] value is %s, and expected value is %s", i+1, hex.EncodeToString(given[i]), hex.EncodeToString(required[i]))
if !bytes.Equal(required[i], given[i]) {
return fmt.Errorf("quote field RTMR[%d] is %s. Expect %s",
i, hex.EncodeToString(given[i]), hex.EncodeToString(required[i]))
}
logger.V(1).Infof("Successfully validated RTMR[%d] field", i+1)
}
return nil
}
func byteCheck(option, field string, size int, given, required []byte) error {
if len(required) == 0 {
logger.V(1).Infof("Skipping validation check for %s field: input provided is nil", field)
return nil
}
if len(required) != size {
return fmt.Errorf("option %v must be nil or %d bytes", option, size)
}
logger.V(2).Infof("Quote field %s value is %s, and expected value is %s", field, hex.EncodeToString(given), hex.EncodeToString(required))
if !bytes.Equal(required, given) {
return fmt.Errorf("quote field %s is %s. Expect %s",
field, hex.EncodeToString(given), hex.EncodeToString(required))
}
logger.V(1).Infof("Successfully validated %s field", field)
return nil
}
func exactByteMatch(quote *pb.QuoteV4, opts *Options) error {
givenRtmr := quote.GetTdQuoteBody().GetRtmrs()
return multierr.Combine(
byteCheck("MrSeam", "MR_SEAM", abi.MrSeamSize, quote.GetTdQuoteBody().GetMrSeam(), opts.TdQuoteBodyOptions.MrSeam),
byteCheck("TdAttributes", "TD_ATTRIBUTES", abi.TdAttributesSize, quote.GetTdQuoteBody().GetTdAttributes(), opts.TdQuoteBodyOptions.TdAttributes),
byteCheck("Xfam", "XFAM", abi.XfamSize, quote.GetTdQuoteBody().GetXfam(), opts.TdQuoteBodyOptions.Xfam),
byteCheck("MrTd", "MR_TD", abi.MrTdSize, quote.GetTdQuoteBody().GetMrTd(), opts.TdQuoteBodyOptions.MrTd),
byteCheck("MrConfigID", "MR_CONFIG_ID", abi.MrConfigIDSize, quote.GetTdQuoteBody().GetMrConfigId(), opts.TdQuoteBodyOptions.MrConfigID),
byteCheck("MrOwner", "MR_OWNER", abi.MrOwnerSize, quote.GetTdQuoteBody().GetMrOwner(), opts.TdQuoteBodyOptions.MrOwner),
byteCheck("MrOwnerConfig", "MR_OWNER_CONFIG", abi.MrOwnerConfigSize, quote.GetTdQuoteBody().GetMrOwnerConfig(), opts.TdQuoteBodyOptions.MrOwnerConfig),
byteCheckRtmr(abi.RtmrSize, givenRtmr, opts.TdQuoteBodyOptions.Rtmrs),
byteCheck("ReportData", "REPORT_DATA", abi.ReportDataSize, quote.GetTdQuoteBody().GetReportData(), opts.TdQuoteBodyOptions.ReportData),
byteCheck("QeVendorID", "QE_VENDOR_ID", abi.QeVendorIDSize, quote.GetHeader().GetQeVendorId(), opts.HeaderOptions.QeVendorID),
)
}
func isSvnHigherOrEqual(quoteSvn []byte, optionSvn []byte) bool {
if optionSvn == nil {
return true
}
for i := range quoteSvn {
if quoteSvn[i] < optionSvn[i] {
return false
}
}
return true
}
func minVersionCheck(quote *pb.QuoteV4, opts *Options) error {
logger.V(1).Info("Setting the minimum_qe_svn parameter value to ", opts.HeaderOptions.MinimumQeSvn)
logger.V(1).Info("Setting the minimum_pce_svn parameter value to ", opts.HeaderOptions.MinimumPceSvn)
logger.V(1).Info("Setting the minimum_tee_tcb_svn parameter value to ", opts.TdQuoteBodyOptions.MinimumTeeTcbSvn)
logger.V(2).Infof("TEE TCB security-version number is %v, and minimum_tee_tcb_svn value is %v", quote.GetTdQuoteBody().GetTeeTcbSvn(), opts.TdQuoteBodyOptions.MinimumTeeTcbSvn)
if !isSvnHigherOrEqual(quote.GetTdQuoteBody().GetTeeTcbSvn(), opts.TdQuoteBodyOptions.MinimumTeeTcbSvn) {
return fmt.Errorf("TEE TCB security-version number %d is less than the required minimum %d",
quote.GetTdQuoteBody().GetTeeTcbSvn(), opts.TdQuoteBodyOptions.MinimumTeeTcbSvn)
}
logger.V(1).Info("Successfully validated TEE TCB security-version number")
qeSvn := binary.LittleEndian.Uint16(quote.GetHeader().GetQeSvn())
pceSvn := binary.LittleEndian.Uint16(quote.GetHeader().GetPceSvn())
logger.V(2).Infof("QE security-version number is %d, and minimum_qe_svn value is %d", qeSvn, opts.HeaderOptions.MinimumQeSvn)
if qeSvn < opts.HeaderOptions.MinimumQeSvn {
return fmt.Errorf("QE security-version number %d is less than the required minimum %d",
qeSvn, opts.HeaderOptions.MinimumQeSvn)
}
logger.V(1).Info("Successfully validated QE security-version number")
logger.V(2).Infof("PCE security-version number is %d, and minimum_pce_svn value is %d", pceSvn, opts.HeaderOptions.MinimumPceSvn)
if pceSvn < opts.HeaderOptions.MinimumPceSvn {
return fmt.Errorf("PCE security-version number %d is less than the required minimum %d",
pceSvn, opts.HeaderOptions.MinimumPceSvn)
}
logger.V(1).Info("Successfully validated PCE security-version number")
return nil
}
func validateXfam(value []byte, fixed1, fixed0 uint64) error {
if len(value) == 0 {
return nil
}
if len(value) != abi.XfamSize {
return fmt.Errorf("xfam size is invalid")
}
xfam := binary.LittleEndian.Uint64(value[:])
logger.V(2).Infof("XFAM value is %v, XFAMFixed0 value is %v and XFAMFixed1 value is %v", xfam, fixed0, fixed1)
if xfam&fixed1 != fixed1 {
return fmt.Errorf("unauthorized xfam 0x%x as xfamFixed1 0x%x bits are unset", xfam, fixed1)
}
if xfam&(^fixed0) != 0 {
return fmt.Errorf("unauthorized xfam 0x%x as xfamFixed0 0x%x bits are set", xfam, fixed0)
}
logger.V(1).Info("Successfully validated XFAM field")
return nil
}
func validateTdAttributes(value []byte, fixed1, fixed0 uint64) error {
if len(value) == 0 {
return nil
}
if len(value) != abi.TdAttributesSize {
return fmt.Errorf("tdAttributes size is invalid")
}
tdAttributes := binary.LittleEndian.Uint64(value[:])
logger.V(2).Infof("TdAttributes value is %v, TdAttributesFixed0 value is %v and TdAttributesFixed1 value is %v", tdAttributes, fixed0, fixed1)
if tdAttributes&fixed1 != fixed1 {
return fmt.Errorf("unauthorized tdAttributes 0x%x as tdAttributesFixed1 0x%x bits are unset", tdAttributes, fixed1)
}
if tdAttributes&(^fixed0) != 0 {
return fmt.Errorf("unauthorized tdAttributes 0x%x as tdAttributesFixed0 0x%x bits are set", tdAttributes, fixed0)
}
logger.V(1).Info("Successfully validated TdAttributes field")
return nil
}
// TdxQuote validates fields of the protobuf representation of an attestation Quote
// against expectations depending on supported quote formats - QuoteV4.
// Does not check the attestation certificates or signature.
func TdxQuote(quote any, options *Options) error {
if options == nil {
return vr.ErrOptionsNil
}
switch q := quote.(type) {
case *pb.QuoteV4:
return tdxQuoteV4(q, options)
default:
return fmt.Errorf("unsupported quote type: %T", quote)
}
}
// tdxQuoteV4 validates QuoteV4 fields of the protobuf representation of an attestation Quote
// against expectations. Does not check the attestation certificates or signature.
func tdxQuoteV4(quote *pb.QuoteV4, options *Options) error {
if err := abi.CheckQuoteV4(quote); err != nil {
return fmt.Errorf("QuoteV4 invalid: %v", err)
}
logger.V(1).Info("Validating the TDX Quote using input parameters")
return multierr.Combine(
exactByteMatch(quote, options),
minVersionCheck(quote, options),
validateXfam(quote.GetTdQuoteBody().GetXfam(), xfamFixed1, xfamFixed0),
validateTdAttributes(quote.GetTdQuoteBody().GetTdAttributes(), tdAttributesFixed1, tdAttributesFixed0),
)
}
// RawTdxQuote checks the raw bytes representation of an attestation quote.
func RawTdxQuote(raw []byte, options *Options) error {
quote, err := abi.QuoteToProto(raw)
if err != nil {
return fmt.Errorf("could not convert raw bytes to QuoteV4: %v", err)
}
return TdxQuote(quote, options)
}
|