#include "channel.hpp" #include "user_channel/channel_layer.hpp" #include #include #include #include #include #include #include #include #include #include using namespace phosphor::logging; using namespace sdbusplus::xyz::openbmc_project::Common::Error; namespace cipher { /** @brief Get the supported Cipher records * * The cipher records are read from the JSON file and converted into * 1. cipher suite record format mentioned in the IPMI specification. The * records can be either OEM or standard cipher. Each json entry is parsed and * converted into the cipher record format and pushed into the vector. * 2. Algorithms listed in vector format * * @return pair of vector containing 1. all the cipher suite records. 2. * Algorithms supported * */ std::pair, std::vector> getCipherRecords() { std::vector cipherRecords; std::vector supportedAlgorithmRecords; // create set to get the unique supported algorithms std::set supportedAlgorithmSet; std::ifstream jsonFile(configFile); if (!jsonFile.is_open()) { log("Channel Cipher suites file not found"); elog(); } auto data = Json::parse(jsonFile, nullptr, false); if (data.is_discarded()) { log("Parsing channel cipher suites JSON failed"); elog(); } for (const auto& record : data) { if (record.find(oem) != record.end()) { // OEM cipher suite - 0xC1 cipherRecords.push_back(oemCipherSuite); // Cipher Suite ID cipherRecords.push_back(record.value(cipher, 0)); // OEM IANA - 3 bytes cipherRecords.push_back(record.value(oem, 0)); cipherRecords.push_back(record.value(oem, 0) >> 8); cipherRecords.push_back(record.value(oem, 0) >> 16); } else { // Standard cipher suite - 0xC0 cipherRecords.push_back(stdCipherSuite); // Cipher Suite ID cipherRecords.push_back(record.value(cipher, 0)); } // Authentication algorithm number cipherRecords.push_back(record.value(auth, 0)); supportedAlgorithmSet.insert(record.value(auth, 0)); // Integrity algorithm number cipherRecords.push_back(record.value(integrity, 0) | integrityTag); supportedAlgorithmSet.insert(record.value(integrity, 0) | integrityTag); // Confidentiality algorithm number cipherRecords.push_back(record.value(conf, 0) | confTag); supportedAlgorithmSet.insert(record.value(conf, 0) | confTag); } // copy the set to supportedAlgorithmRecord which is vector based. std::copy(supportedAlgorithmSet.begin(), supportedAlgorithmSet.end(), std::back_inserter(supportedAlgorithmRecords)); return std::make_pair(cipherRecords, supportedAlgorithmRecords); } } // namespace cipher /** @brief this command is used to look up what authentication, integrity, * confidentiality algorithms are supported. * * @ param ctx - context pointer * @ param channelNumber - channel number * @ param payloadType - payload type * @ param listIndex - list index * @ param algoSelectBit - list algorithms * * @returns ipmi completion code plus response data * - rspChannel - channel number for authentication algorithm. * - rspRecords - cipher suite records. **/ ipmi::RspType // Cipher Records > getChannelCipherSuites(ipmi::Context::ptr ctx, uint4_t channelNumber, uint4_t reserved1, uint8_t payloadType, uint6_t listIndex, uint1_t reserved2, uint1_t algoSelectBit) { static std::vector cipherRecords; static std::vector supportedAlgorithms; static auto recordInit = false; uint8_t rspChannel = ipmi::convertCurrentChannelNum( static_cast(channelNumber), ctx->channel); if (!ipmi::isValidChannel(rspChannel) || reserved1 != 0 || reserved2 != 0) { return ipmi::responseInvalidFieldRequest(); } if (!ipmi::isValidPayloadType(static_cast(payloadType))) { log("Get channel cipher suites - Invalid payload type"); constexpr uint8_t ccPayloadTypeNotSupported = 0x80; return ipmi::response(ccPayloadTypeNotSupported); } if (!recordInit) { try { std::tie(cipherRecords, supportedAlgorithms) = cipher::getCipherRecords(); recordInit = true; } catch (const std::exception& e) { return ipmi::responseUnspecifiedError(); } } const std::vector& records = algoSelectBit ? cipherRecords : supportedAlgorithms; static constexpr auto respSize = 16; // Session support is available in active LAN channels. if ((ipmi::getChannelSessionSupport(rspChannel) == ipmi::EChannelSessSupported::none) || !(ipmi::doesDeviceExist(rspChannel))) { log("Get channel cipher suites - Device does not exist"); return ipmi::responseInvalidFieldRequest(); } // List index(00h-3Fh), 0h selects the first set of 16, 1h selects the next // set of 16 and so on. // Calculate the number of record data bytes to be returned. auto start = std::min(static_cast(listIndex) * respSize, records.size()); auto end = std::min((static_cast(listIndex) * respSize) + respSize, records.size()); auto size = end - start; std::vector rspRecords; std::copy_n(records.data() + start, size, std::back_inserter(rspRecords)); return ipmi::responseSuccess(rspChannel, rspRecords); } template static int executeCmd(const char* path, ArgTypes&&... tArgs) { boost::process::child execProg(path, const_cast(tArgs)...); execProg.wait(); return execProg.exit_code(); } /** @brief Enable the network IPMI service on the specified ethernet interface. * * @param[in] intf - ethernet interface on which to enable IPMI */ void enableNetworkIPMI(const std::string& intf) { // Check if there is a iptable filter to drop IPMI packets for the // interface. auto retCode = executeCmd("/usr/sbin/iptables", "-C", "INPUT", "-p", "udp", "-i", intf.c_str(), "--dport", "623", "-j", "DROP"); // If the iptable filter exists, delete the filter. if (!retCode) { auto response = executeCmd("/usr/sbin/iptables", "-D", "INPUT", "-p", "udp", "-i", intf.c_str(), "--dport", "623", "-j", "DROP"); if (response) { log("Dropping the iptables filter failed", entry("INTF=%s", intf.c_str()), entry("RETURN_CODE:%d", response)); } } } /** @brief Disable the network IPMI service on the specified ethernet interface. * * @param[in] intf - ethernet interface on which to disable IPMI */ void disableNetworkIPMI(const std::string& intf) { // Check if there is a iptable filter to drop IPMI packets for the // interface. auto retCode = executeCmd("/usr/sbin/iptables", "-C", "INPUT", "-p", "udp", "-i", intf.c_str(), "--dport", "623", "-j", "DROP"); // If the iptable filter does not exist, add filter to drop network IPMI // packets if (retCode) { auto response = executeCmd("/usr/sbin/iptables", "-I", "INPUT", "-p", "udp", "-i", intf.c_str(), "--dport", "623", "-j", "DROP"); if (response) { log("Inserting iptables filter failed", entry("INTF=%s", intf.c_str()), entry("RETURN_CODE:%d", response)); } } }