Skip to content

Commit 726eb4e

Browse files
authored
Merge pull request #189 from hug-dev/tm-proofs
Implement mitigation 4 of TM
2 parents fbb239b + 21b9885 commit 726eb4e

File tree

6 files changed

+80
-22
lines changed

6 files changed

+80
-22
lines changed

src/front/front_end.rs

+45-15
Original file line numberDiff line numberDiff line change
@@ -56,35 +56,65 @@ impl FrontEndHandler {
5656
return;
5757
}
5858
};
59+
5960
// Check if the request was sent without authentication
60-
let response = if AuthType::NoAuth == request.header.auth_type {
61-
let response = self.dispatcher.dispatch_request(request, None);
62-
trace!("dispatch_request egress");
63-
response
61+
let (app_name, err_response) = if AuthType::NoAuth == request.header.auth_type {
62+
(None, None)
6463
// Otherwise find an authenticator that is capable to authenticate the request
6564
} else if let Some(authenticator) = self.authenticators.get(&request.header.auth_type) {
6665
// Authenticate the request
6766
match authenticator.authenticate(&request.auth) {
6867
// Send the request to the dispatcher
6968
// Get a response back
70-
Ok(app_name) => {
71-
let response = self.dispatcher.dispatch_request(request, Some(app_name));
72-
trace!("dispatch_request egress");
73-
response
74-
}
75-
Err(status) => Response::from_request_header(request.header, status),
69+
Ok(app_name) => (Some(app_name), None),
70+
Err(status) => (
71+
None,
72+
Some(Response::from_request_header(request.header, status)),
73+
),
7674
}
7775
} else {
78-
Response::from_request_header(
79-
request.header,
80-
ResponseStatus::AuthenticatorNotRegistered,
76+
(
77+
None,
78+
Some(Response::from_request_header(
79+
request.header,
80+
ResponseStatus::AuthenticatorNotRegistered,
81+
)),
8182
)
8283
};
8384

84-
// Serialise the responso into bytes
85+
let response = if let Some(err_response) = err_response {
86+
err_response
87+
} else {
88+
if crate::utils::GlobalConfig::log_error_details() {
89+
if let Some(app_name_string) = app_name.clone() {
90+
info!(
91+
"New request received from application name \"{}\"",
92+
app_name_string
93+
)
94+
} else {
95+
info!("New request received without authentication")
96+
}
97+
};
98+
let response = self.dispatcher.dispatch_request(request, app_name.clone());
99+
trace!("dispatch_request egress");
100+
response
101+
};
102+
103+
// Serialise the response into bytes
85104
// Write bytes to stream
86105
match response.write_to_stream(&mut stream) {
87-
Ok(_) => info!("Request handled successfully"),
106+
Ok(_) => {
107+
if crate::utils::GlobalConfig::log_error_details() {
108+
if let Some(app_name_string) = app_name {
109+
info!(
110+
"Response from application name \"{}\" sent back",
111+
app_name_string
112+
);
113+
} else {
114+
info!("Response sent back from request without authentication");
115+
}
116+
}
117+
}
88118
Err(err) => format_error!("Failed to send response", err),
89119
}
90120
}

src/key_info_managers/on_disk_manager/mod.rs

+13-4
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
//! For security reasons, only the PARSEC service should have the ability to modify these files.
1515
use super::{KeyInfo, KeyTriple, ManageKeyInfo};
1616
use crate::authenticators::ApplicationName;
17-
use log::{error, info};
17+
use log::{error, info, warn};
1818
use parsec_interface::requests::ProviderID;
1919
use std::collections::HashMap;
2020
use std::convert::TryFrom;
@@ -187,9 +187,6 @@ impl OnDiskKeyInfoManager {
187187
for app_name_dir_path in list_dirs(&mappings_dir_path)?.iter() {
188188
for provider_dir_path in list_dirs(&app_name_dir_path)?.iter() {
189189
for key_name_file_path in list_files(&provider_dir_path)?.iter() {
190-
if crate::utils::GlobalConfig::log_error_details() {
191-
info!("Found mapping file: {:?}.", key_name_file_path);
192-
}
193190
let mut key_info = Vec::new();
194191
let mut key_info_file = File::open(&key_name_file_path)?;
195192
let _ = key_info_file.read_to_end(&mut key_info)?;
@@ -209,6 +206,12 @@ impl OnDiskKeyInfoManager {
209206
))?,
210207
) {
211208
Ok(key_triple) => {
209+
if crate::utils::GlobalConfig::log_error_details() {
210+
warn!(
211+
"Inserting Key Triple ({}) mapping read from disk.",
212+
key_triple.clone()
213+
);
214+
}
212215
let _ = key_store.insert(key_triple, key_info);
213216
}
214217
Err(string) => {
@@ -236,6 +239,12 @@ impl OnDiskKeyInfoManager {
236239
/// The filename will be `mappings/[APP_NAME]/[PROVIDER_NAME]/[KEY_NAME]` under the same path as the
237240
/// on-disk manager. It will contain the Key info data.
238241
fn save_mapping(&self, key_triple: &KeyTriple, key_info: &KeyInfo) -> std::io::Result<()> {
242+
if crate::utils::GlobalConfig::log_error_details() {
243+
warn!(
244+
"Saving Key Triple ({}) mapping to disk.",
245+
key_triple.clone()
246+
);
247+
}
239248
// Create the directories with base64 names.
240249
let (app_name, prov, key_name) = key_triple_to_base64_filenames(key_triple);
241250
let provider_dir_path = self.mappings_dir_path.join(app_name).join(prov);

src/providers/pkcs11_provider/asym_sign.rs

+5-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ use super::Pkcs11Provider;
44
use super::{key_management::get_key_info, utils, KeyPairType, ReadWriteSession, Session};
55
use crate::authenticators::ApplicationName;
66
use crate::key_info_managers::KeyTriple;
7-
use log::{error, info};
7+
use log::{error, info, trace};
88
use parsec_interface::operations::psa_algorithm::*;
99
use parsec_interface::operations::{psa_sign_hash, psa_verify_hash};
1010
use parsec_interface::requests::{ProviderID, ResponseStatus, Result};
@@ -78,6 +78,7 @@ impl Pkcs11Provider {
7878
let key = self.find_key(session.session_handle(), key_id, KeyPairType::PrivateKey)?;
7979
info!("Located signing key.");
8080

81+
trace!("SignInit command");
8182
match self.backend.sign_init(session.session_handle(), &mech, key) {
8283
Ok(_) => {
8384
info!("Signing operation initialized.");
@@ -89,6 +90,7 @@ impl Pkcs11Provider {
8990
// should not fail - if it does, there's some error in our stack
9091
.or(Err(ResponseStatus::PsaErrorGenericError))?;
9192

93+
trace!("Sign command");
9294
match self.backend.sign(session.session_handle(), &digest_info) {
9395
Ok(signature) => Ok(psa_sign_hash::Result { signature }),
9496
Err(e) => {
@@ -164,6 +166,7 @@ impl Pkcs11Provider {
164166
let key = self.find_key(session.session_handle(), key_id, KeyPairType::PublicKey)?;
165167
info!("Located public key.");
166168

169+
trace!("VerifyInit command");
167170
match self
168171
.backend
169172
.verify_init(session.session_handle(), &mech, key)
@@ -178,6 +181,7 @@ impl Pkcs11Provider {
178181
// should not fail - if it does, there's some error in our stack
179182
.or(Err(ResponseStatus::PsaErrorGenericError))?;
180183

184+
trace!("Verify command");
181185
match self
182186
.backend
183187
.verify(session.session_handle(), &digest_info, &signature)

src/providers/pkcs11_provider/key_management.rs

+10-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ use super::{
77
use crate::authenticators::ApplicationName;
88
use crate::key_info_managers::KeyTriple;
99
use crate::key_info_managers::{self, ManageKeyInfo};
10-
use log::{error, info, warn};
10+
use log::{error, info, trace, warn};
1111
use parsec_interface::operations::psa_key_attributes::*;
1212
use parsec_interface::operations::{
1313
psa_destroy_key, psa_export_public_key, psa_generate_key, psa_import_key,
@@ -116,12 +116,15 @@ impl Pkcs11Provider {
116116
KeyPairType::Any => (),
117117
}
118118

119+
trace!("FindObjectsInit command");
119120
if let Err(e) = self.backend.find_objects_init(session, &template) {
120121
format_error!("Object enumeration init failed", e);
121122
Err(utils::to_response_status(e))
122123
} else {
124+
trace!("FindObjects command");
123125
match self.backend.find_objects(session, 1) {
124126
Ok(objects) => {
127+
trace!("FindObjectsFinal command");
125128
if let Err(e) = self.backend.find_objects_final(session) {
126129
format_error!("Object enumeration final failed", e);
127130
Err(utils::to_response_status(e))
@@ -220,6 +223,7 @@ impl Pkcs11Provider {
220223
);
221224
}
222225

226+
trace!("GenerateKeyPair command");
223227
match self.backend.generate_key_pair(
224228
session.session_handle(),
225229
&mech,
@@ -362,6 +366,7 @@ impl Pkcs11Provider {
362366
);
363367
}
364368

369+
trace!("CreateObject command");
365370
match self
366371
.backend
367372
.create_object(session.session_handle(), &template)
@@ -408,6 +413,7 @@ impl Pkcs11Provider {
408413
size_attrs.push(CK_ATTRIBUTE::new(pkcs11::types::CKA_PUBLIC_EXPONENT));
409414

410415
// Get the length of the attributes to retrieve.
416+
trace!("GetAttributeValue command");
411417
let (modulus_len, public_exponent_len) =
412418
match self
413419
.backend
@@ -440,6 +446,7 @@ impl Pkcs11Provider {
440446
.with_bytes(public_exponent.as_mut_slice()),
441447
);
442448

449+
trace!("GetAttributeValue command");
443450
match self
444451
.backend
445452
.get_attribute_value(session.session_handle(), key, &mut extract_attrs)
@@ -502,6 +509,7 @@ impl Pkcs11Provider {
502509

503510
match self.find_key(session.session_handle(), key_id, KeyPairType::Any) {
504511
Ok(key) => {
512+
trace!("DestroyObject command");
505513
match self.backend.destroy_object(session.session_handle(), key) {
506514
Ok(_) => info!("Private part of the key destroyed successfully."),
507515
Err(e) => {
@@ -519,6 +527,7 @@ impl Pkcs11Provider {
519527
// Second key is optional.
520528
match self.find_key(session.session_handle(), key_id, KeyPairType::Any) {
521529
Ok(key) => {
530+
trace!("DestroyObject command");
522531
match self.backend.destroy_object(session.session_handle(), key) {
523532
Ok(_) => info!("Private part of the key destroyed successfully."),
524533
Err(e) => {

src/providers/pkcs11_provider/mod.rs

+2
Original file line numberDiff line numberDiff line change
@@ -250,6 +250,7 @@ impl Provide for Pkcs11Provider {
250250

251251
impl Drop for Pkcs11Provider {
252252
fn drop(&mut self) {
253+
trace!("Finalize command");
253254
if let Err(e) = self.backend.finalize() {
254255
format_error!("Error when dropping the PKCS 11 provider", e);
255256
}
@@ -332,6 +333,7 @@ impl Pkcs11ProviderBuilder {
332333
args.LockMutex = None;
333334
args.UnlockMutex = None;
334335
args.flags = CKF_OS_LOCKING_OK;
336+
trace!("Initialize command");
335337
backend.initialize(Some(args)).or_else(|e| {
336338
format_error!("Error initializing the PKCS 11 backend", e);
337339
Err(Error::new(

src/providers/pkcs11_provider/utils.rs

+5-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
use super::Pkcs11Provider;
55
use log::error;
6-
use log::{info, warn};
6+
use log::{info, trace, warn};
77
use parsec_interface::requests::ResponseStatus;
88
use parsec_interface::requests::Result;
99
use picky_asn1::wrapper::IntegerAsn1;
@@ -104,6 +104,7 @@ impl Session<'_> {
104104
session_flags |= CKF_RW_SESSION;
105105
}
106106

107+
trace!("OpenSession command");
107108
match provider
108109
.backend
109110
.open_session(provider.slot_number, session_flags, None, None)
@@ -167,6 +168,7 @@ impl Session<'_> {
167168
self.is_logged_in = true;
168169
Ok(())
169170
} else if let Some(user_pin) = self.provider.user_pin.as_ref() {
171+
trace!("Login command");
170172
match self
171173
.provider
172174
.backend
@@ -209,6 +211,7 @@ impl Session<'_> {
209211
Ok(())
210212
} else if *logged_sessions_counter == 1 {
211213
// Only this session requires authentication.
214+
trace!("Logout command");
212215
match self.provider.backend.logout(self.session_handle) {
213216
Ok(_) => {
214217
if crate::utils::GlobalConfig::log_error_details() {
@@ -247,6 +250,7 @@ impl Drop for Session<'_> {
247250
if self.logout().is_err() {
248251
error!("Error while logging out. Continuing...");
249252
}
253+
trace!("CloseSession command");
250254
match self.provider.backend.close_session(self.session_handle) {
251255
Ok(_) => {
252256
if crate::utils::GlobalConfig::log_error_details() {

0 commit comments

Comments
 (0)