1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171
|
// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2022 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package luks2
import (
"bytes"
"fmt"
"io"
"os/exec"
"strconv"
"time"
"github.com/snapcore/snapd/osutil"
)
const (
// AnySlot tells a command to automatically choose an appropriate slot
// as opposed to hard coding one.
AnySlot = -1
)
// cryptsetupCmd is a helper for running the cryptsetup command. If stdin is supplied, data read
// from it is supplied to cryptsetup via its stdin. If callback is supplied, it will be invoked
// after cryptsetup has started.
func cryptsetupCmd(stdin io.Reader, args ...string) error {
cmd := exec.Command("cryptsetup", args...)
cmd.Stdin = stdin
if output, err := cmd.CombinedOutput(); err != nil {
return fmt.Errorf("cryptsetup failed with: %v", osutil.OutputErr(output, err))
}
return nil
}
// KDFOptions specifies parameters for the Argon2 KDF.
type KDFOptions struct {
// TargetDuration specifies the target time for benchmarking of the
// time and memory cost parameters. If it is zero then the cryptsetup
// default is used. If ForceIterations is not zero then this is ignored.
TargetDuration time.Duration
// MemoryKiB specifies the maximum memory cost in KiB when ForceIterations
// is zero, or the actual memory cost in KiB when ForceIterations is not zero.
// If this is set to zero, then the cryptsetup default is used.
MemoryKiB int
// ForceIterations specifies the time cost. If set to zero, the time
// and memory cost are determined by benchmarking the algorithm based on
// the specified TargetDuration. Set to a non-zero number to force the
// time cost to the value of this field, and the memory cost to the value
// of MemoryKiB, disabling benchmarking.
ForceIterations int
// Parallel sets the maximum number of parallel threads. Cryptsetup may
// choose a lower value based on its own maximum and the number of available
// CPU cores.
Parallel int
}
func (options *KDFOptions) appendArguments(args []string) []string {
// use argon2i as the KDF
args = append(args, "--pbkdf", "argon2i")
switch {
case options.ForceIterations != 0:
// Disable benchmarking by forcing the time cost
args = append(args,
"--pbkdf-force-iterations", strconv.Itoa(options.ForceIterations))
case options.TargetDuration != 0:
args = append(args,
"--iter-time", strconv.FormatInt(int64(options.TargetDuration/time.Millisecond), 10))
}
if options.MemoryKiB != 0 {
args = append(args, "--pbkdf-memory", strconv.Itoa(options.MemoryKiB))
}
if options.Parallel != 0 {
args = append(args, "--pbkdf-parallel", strconv.Itoa(options.Parallel))
}
return args
}
// AddKeyOptions provides the options for adding a key to a LUKS2 volume
type AddKeyOptions struct {
// KDFOptions describes the KDF options for the new key slot.
KDFOptions KDFOptions
// Slot is the keyslot to use. Note that the default value is slot 0. In
// order to automatically choose a slot, use AnySlot.
Slot int
}
// AddKey adds the supplied key in to a new keyslot for specified LUKS2 container. In order to do this,
// an existing key must be provided. The KDF for the new keyslot will be configured to use argon2i with
// the supplied benchmark time. The key will be added to the supplied slot.
//
// If options is not supplied, the default KDF benchmark time is used and the command will
// automatically choose an appropriate slot.
func AddKey(devicePath string, existingKey, key []byte, options *AddKeyOptions) error {
if options == nil {
options = &AddKeyOptions{Slot: AnySlot}
}
args := []string{
// add a new key
"luksAddKey",
// LUKS2 only
"--type", "luks2",
// read existing key from stdin, specifying key size so
// cryptsetup knows where the existing key ends and the new key
// starts (we are passing both keys via stdin). Otherwise it
// would interpret new lines as separator for the keys, while
// we actually allow '\n' to be part of the keys.
"--key-file", "-",
"--keyfile-size", strconv.Itoa(len(existingKey)),
// remove warnings and confirmation questions
"--batch-mode"}
// apply KDF options
args = options.KDFOptions.appendArguments(args)
if options.Slot != AnySlot {
// TODO use --new-key-slot for newer crypsetup versions
args = append(args, "--key-slot", strconv.Itoa(options.Slot))
}
args = append(args,
// container to add key to
devicePath,
// we read raw bytes up to EOF (so new key can contain '\n':
// without the option it would be interpreted as end of key)
"-",
)
// existing and new key are both read from stdin
cmdInput := bytes.NewReader(append(existingKey, key...))
return cryptsetupCmd(cmdInput, args...)
}
// KillSlot erases the keyslot with the supplied slot number from the specified LUKS2 container.
// Note that a valid key for a remaining keyslot must be supplied, in order to prevent the last
// keyslot from being erased.
func KillSlot(devicePath string, slot int, key []byte) error {
return cryptsetupCmd(bytes.NewReader(key), "luksKillSlot", "--type", "luks2", "--key-file", "-", devicePath, strconv.Itoa(slot))
}
// SetSlotPriority sets the priority of the keyslot with the supplied slot number on
// the specified LUKS2 container.
func SetSlotPriority(devicePath string, slot int, priority SlotPriority) error {
return cryptsetupCmd(nil, "config", "--priority", priority.String(), "--key-slot", strconv.Itoa(slot), devicePath)
}
|