特权级与内核安全示例

既然通常情况下选择子中的RPL与对应描述符中的DPL相同,那么是否可以取缔RPL?

RPL是保证内核数据安全的关键要素之一;在内核代码中有决定性作用,绝对不能取缔!

用户程序怎么获得内核的私密数据呢?

下面我们来进行实验

%include "inc.asm"

org 0x9000

jmp ENTRY_SEGMENT

[section .gdt]
; GDT definition
;                                      段基址,       段界限,             段属性
GDT_ENTRY            :     Descriptor    0,            0,                0
CODE32_DESC          :     Descriptor    0,    Code32SegLen - 1,         DA_C + DA_32 + DA_DPL3
VIDEO_DESC           :     Descriptor 0xB8000,     0x07FFF,              DA_DRWA + DA_32 + DA_DPL3
DATA32_KERNEL_DESC   :     Descriptor    0,    Data32KernelSegLen - 1,   DA_DRW + DA_32 + DA_DPL0  
DATA32_USER_DESC     :     Descriptor    0,    Data32UserSegLen - 1,     DA_DRW + DA_32 + DA_DPL3  
STACK32_KERNEL_DESC  :     Descriptor    0,     TopOfKernelStack32,      DA_DRW + DA_32 + DA_DPL0
STACK32_USER_DESC    :     Descriptor    0,     TopOfUserStack32,        DA_DRW + DA_32 + DA_DPL3
TSS_DESC             :     Descriptor    0,       TSSLen - 1,            DA_386TSS + DA_DPL0
FUNCTION_DESC        :     Descriptor    0,   FunctionSegLen - 1,        DA_C + DA_32 + DA_DPL0
; Call Gate
;                                                  选择子,                 偏移,          参数个数,      属性
FUNC_GET_KERNEL_DATA_DESC	:	Gate		    FunctionSelector,     GetKernelData,        0,          DA_386CGate + DA_DPL3

; GDT end

GdtLen    equ   $ - GDT_ENTRY

GdtPtr:
          dw   GdtLen - 1
          dd   0
          
          
; GDT Selector
Code32Selector         equ (0x0001 << 3) + SA_TIG + SA_RPL3
VideoSelector          equ (0x0002 << 3) + SA_TIG + SA_RPL3
KernelData32Selector   equ (0x0003 << 3) + SA_TIG + SA_RPL0
UserData32Selector     equ (0x0004 << 3) + SA_TIG + SA_RPL3
KernelStack32Selector  equ (0x0005 << 3) + SA_TIG + SA_RPL0
UserStack32Selector    equ (0x0006 << 3) + SA_TIG + SA_RPL3
TSSSelector            equ (0x0007 << 3) + SA_TIG + SA_RPL0
FunctionSelector       equ (0x0008 << 3) + SA_TIG + SA_RPL0
; Gate Selector
GetKernelDataSelector  equ (0x0009 << 3) + SA_TIG + SA_RPL0
; end of [section .gdt]

TopOfStack16    equ 0x7c00

[section .s16]
[bits 16]
ENTRY_SEGMENT:
    mov ax, cs
    mov ds, ax
    mov es, ax
    mov ss, ax
    mov sp, TopOfStack16
    
    ; initialize GDT for 32 bits code segment
    mov esi, CODE32_SEGMENT
    mov edi, CODE32_DESC
    
    call InitDescItem
    
    mov esi, DATA32_KERNEL_SEGMENT
    mov edi, DATA32_KERNEL_DESC
    
    call InitDescItem
    
    mov esi, DATA32_USER_SEGMENT
    mov edi, DATA32_USER_DESC
    
    call InitDescItem
    
    mov esi, STACK32_KERNEL_SEGMENT
    mov edi, STACK32_KERNEL_DESC
    
    call InitDescItem
    
    mov esi, STACK32_USER_SEGMENT
    mov edi, STACK32_USER_DESC
    
    call InitDescItem
    
    mov esi, FUNCTION_SEGMENT
    mov edi, FUNCTION_DESC
    
    call InitDescItem
    
    mov esi, TSS_SEGMENT
    mov edi, TSS_DESC
    
    call InitDescItem
    
    
    ; initialize GDT pointer struct
    mov eax, 0
    mov ax, ds
    shl eax, 4
    add eax, GDT_ENTRY
    mov dword [GdtPtr + 2], eax

    ; 1. load GDT
    lgdt [GdtPtr]
    
    ; 2. close interrupt
    cli 
    
    ; 3. open A20
    in al, 0x92
    or al, 00000010b
    out 0x92, al
    
    ; 4. enter protect mode
    mov eax, cr0
    or eax, 0x01
    mov cr0, eax
    
    ; 5. load TSS
    mov ax, TSSSelector
    ltr ax
    
    ; 6. jump to 32 bits code
    ;jmp word Code32Selector : 0
    push UserStack32Selector
    push TopOfUserStack32
    push Code32Selector    
    push 0                 
    retf


; esi    --> code segment label
; edi    --> descriptor label
InitDescItem:
    push eax

    mov eax, 0
    mov ax, cs
    shl eax, 4
    add eax, esi
    mov word [edi + 2], ax
    shr eax, 16
    mov byte [edi + 4], al
    mov byte [edi + 7], ah
    
    pop eax
    
    ret

[section .kdat]
[bits 32]
DATA32_KERNEL_SEGMENT:
    KDAT               db  "Kernel Data", 0
    KDAT_LEN           equ $ - KDAT
    KDAT_OFFSET        equ KDAT - $$

Data32KernelSegLen equ $ - DATA32_KERNEL_SEGMENT

[section .udat]
[bits 32]
DATA32_USER_SEGMENT:
    UDAT               times 16 db 0
    UDAT_LEN           equ $ - UDAT
    UDAT_OFFSET        equ UDAT - $$

Data32UserSegLen equ $ - DATA32_USER_SEGMENT

[section .tss]
[bits 32]
TSS_SEGMENT:
        dd    0
        dd    TopOfKernelStack32      ; 0
        dd    KernelStack32Selector   ;
        dd    0                       ; 1
        dd    0                       ;
        dd    0                       ; 2
        dd    0                       ;
        times 4 * 18 dd 0
        dw    0
        dw    $ - TSS_SEGMENT + 2
        db    0xFF
        
TSSLen    equ    $ - TSS_SEGMENT


   
[section .s32]
[bits 32]
CODE32_SEGMENT:
    mov ax, VideoSelector
    mov gs, ax
    
    mov ax, UserData32Selector
    mov es, ax
    
	mov di, UDAT_OFFSET

	call GetKernelDataSelector : 0

	mov ax, UserData32Selector
	mov ds, ax
	mov ebp, UDAT_OFFSET
	mov bx, 0x0c
	mov dh, 12
	mov dl, 33
	call PrintString

    jmp $
    
; ds:ebp    --> string address
; bx        --> attribute
; dx        --> dh : row, dl : col
PrintString:
    push ebp
    push eax
    push edi
    push cx
    push dx
    
print:
    mov cl, [ds:ebp]
    cmp cl, 0
    je end
    mov eax, 80
    mul dh
    add al, dl
    shl eax, 1
    mov edi, eax
    mov ah, bl
    mov al, cl
    mov [gs:edi], ax
    inc ebp
    inc dl
    jmp print

end:
    pop dx
    pop cx
    pop edi
    pop eax
    pop ebp
    
    ret

Code32SegLen    equ    $ - CODE32_SEGMENT


[section .func]
[bits 32]
FUNCTION_SEGMENT:

; es:di --> data buffer 
GetKernelDataFunc:  

    mov ax, KernelData32Selector
    mov ds, ax
    
    mov si, KDAT_OFFSET
    
    mov cx, KDAT_LEN
    
    call KMemCpy
    
    retf

; ds:si --> source
; es:di --> destination
; cx    --> length
KMemCpy:
	cmp si, di
	ja btoe
	
	add si, cx
	add di, cx
	dec si
	dec di
	jmp etob

btoe:
	cmp cx, 0
	jz done
	mov al, [ds:si]
	mov byte [es:di], al
	inc si
	inc di
	dec cx
	jmp btoe
	
etob:
	cmp cx, 0
	jz done
	mov al, [ds:si]
	mov byte [es:di], al
	dec si
	dec di
	dec cx
	jmp etob	

done:
	ret
  
GetKernelData    equ   GetKernelDataFunc - $$
FunctionSegLen    equ   $ - FUNCTION_SEGMENT

[section .kgs]
[bits 32]
STACK32_KERNEL_SEGMENT:
    times 256 db 0
    
Stack32KernelSegLen equ $ - STACK32_KERNEL_SEGMENT
TopOfKernelStack32  equ Stack32KernelSegLen - 1

[section .ugs]
[bits 32]
STACK32_USER_SEGMENT:
    times 256 db 0
    
Stack32UserSegLen equ $ - STACK32_USER_SEGMENT
TopOfUserStack32  equ Stack32UserSegLen - 1

 245行-300行,我们定义了内核的代码段,这段代码的注意功能是把内核数据拷贝到一个指定的地址。195行,应用程序想通过调用门将内核的数据拷贝到用户态的数据段上,我们来看一下运行结果。

应用程序成功拿到了内核的数据。 那么我们怎么防止应用程序窃取内核数据呢?

初步解决方案

判断段寄存器中RPL的值

判断RPL的值是否为SA_RPL0

  • true - 检查通过,可继续访问数据
  • false - 特权级较低,触发异常

代码流程如下

更改过后的代码如下

[section .func]
[bits 32]
FUNCTION_SEGMENT:

; es:di --> data buffer 
GetKernelDataFunc:
    mov ax, KernelData32Selector
    mov ds, ax
    
    mov si, KDAT_OFFSET
    
    mov cx, KDAT_LEN
    
    call KMemCpy
    
    retf

; ds:si --> source
; es:di --> destination
; cx    --> length
KMemCpy:
    mov ax, es  
	call CheckRPL

	cmp si, di
	ja btoe
	
	add si, cx
	add di, cx
	dec si
	dec di
	jmp etob

btoe:
	cmp cx, 0
	jz done
	mov al, [ds:si]
	mov byte [es:di], al
	inc si
	inc di
	dec cx
	jmp btoe
	
etob:
	cmp cx, 0
	jz done
	mov al, [ds:si]
	mov byte [es:di], al
	dec si
	dec di
	dec cx
	jmp etob	

done:
	ret

; ax    -->    Selector value
CheckRPL:
	and ax, 0x0003
	cmp ax, SA_RPL0
	jz valid

	mov ax, 0
	mov fs, ax
	mov byte [fs : 0], 0

valid:
	ret

GetKernelData    equ   GetKernelDataFunc - $$
FunctionSegLen    equ   $ - FUNCTION_SEGMENT

 我们新增了CheckRPL函数,在进行内核数据的拷贝之前,会检查要拷贝的数据段的RPL是否为0,为0的话,则正常的拷贝,不为0的话,则处理器产生一个异常。因为当前要拷贝到的数据段的RPL为3,所以处理器会产生一个异常。

当前方案存在的问题

用户程序可以伪造选择子中的RPL值,从而绕开安全检查的机制(CheckRPL)。

解决思路 : 追求真实的请求者

  1. 在栈中获取函数远调用前CS寄存器的值(请求者)
  2. 从之前CS寄存器的值中获取RPL(请求者特权级)
  3. 用RPL更新到数据缓冲区对应的段寄存器中
  4. 使用CheckRPL对段寄存器进行安全检查

GetKernelDataFunc:
	mov cx, [esp + 4]
	and cx, 0x03
	mov ax, es  
	and ax, 0xfffc
	or ax, cx
	mov es, ax

 当前esp指向eip,eip占4个字节,我们可以用过esp + 4拿到cs寄存器的值,取它的后两位作为新的特权级,这是它真正的特权级(CPL),通过这个特权级我们来判断对应的操作是否合法。

下面给出完整的代码

%include "inc.asm"

org 0x9000

jmp ENTRY_SEGMENT

[section .gdt]
; GDT definition
;                                      段基址,       段界限,             段属性
GDT_ENTRY            :     Descriptor    0,            0,                0
CODE32_DESC          :     Descriptor    0,    Code32SegLen - 1,         DA_C + DA_32 + DA_DPL3
VIDEO_DESC           :     Descriptor 0xB8000,     0x07FFF,              DA_DRWA + DA_32 + DA_DPL3
DATA32_KERNEL_DESC   :     Descriptor    0,    Data32KernelSegLen - 1,   DA_DRW + DA_32 + DA_DPL0  
DATA32_USER_DESC     :     Descriptor    0,    Data32UserSegLen - 1,     DA_DRW + DA_32 + DA_DPL3  
STACK32_KERNEL_DESC  :     Descriptor    0,     TopOfKernelStack32,      DA_DRW + DA_32 + DA_DPL0
STACK32_USER_DESC    :     Descriptor    0,     TopOfUserStack32,        DA_DRW + DA_32 + DA_DPL3
TSS_DESC             :     Descriptor    0,       TSSLen - 1,            DA_386TSS + DA_DPL0
FUNCTION_DESC        :     Descriptor    0,   FunctionSegLen - 1,        DA_C + DA_32 + DA_DPL0
; Call Gate
;                                                  选择子,                 偏移,          参数个数,      属性
FUNC_GET_KERNEL_DATA_DESC	:	Gate		    FunctionSelector,     GetKernelData,        0,          DA_386CGate + DA_DPL3

; GDT end

GdtLen    equ   $ - GDT_ENTRY

GdtPtr:
          dw   GdtLen - 1
          dd   0
          
          
; GDT Selector
Code32Selector         equ (0x0001 << 3) + SA_TIG + SA_RPL3
VideoSelector          equ (0x0002 << 3) + SA_TIG + SA_RPL3
KernelData32Selector   equ (0x0003 << 3) + SA_TIG + SA_RPL0
UserData32Selector     equ (0x0004 << 3) + SA_TIG + SA_RPL0
KernelStack32Selector  equ (0x0005 << 3) + SA_TIG + SA_RPL0
UserStack32Selector    equ (0x0006 << 3) + SA_TIG + SA_RPL3
TSSSelector            equ (0x0007 << 3) + SA_TIG + SA_RPL0
FunctionSelector       equ (0x0008 << 3) + SA_TIG + SA_RPL0
; Gate Selector
GetKernelDataSelector  equ (0x0009 << 3) + SA_TIG + SA_RPL0
; end of [section .gdt]

TopOfStack16    equ 0x7c00

[section .s16]
[bits 16]
ENTRY_SEGMENT:
    mov ax, cs
    mov ds, ax
    mov es, ax
    mov ss, ax
    mov sp, TopOfStack16
    
    ; initialize GDT for 32 bits code segment
    mov esi, CODE32_SEGMENT
    mov edi, CODE32_DESC
    
    call InitDescItem
    
    mov esi, DATA32_KERNEL_SEGMENT
    mov edi, DATA32_KERNEL_DESC
    
    call InitDescItem
    
    mov esi, DATA32_USER_SEGMENT
    mov edi, DATA32_USER_DESC
    
    call InitDescItem
    
    mov esi, STACK32_KERNEL_SEGMENT
    mov edi, STACK32_KERNEL_DESC
    
    call InitDescItem
    
    mov esi, STACK32_USER_SEGMENT
    mov edi, STACK32_USER_DESC
    
    call InitDescItem
    
    mov esi, FUNCTION_SEGMENT
    mov edi, FUNCTION_DESC
    
    call InitDescItem
    
    mov esi, TSS_SEGMENT
    mov edi, TSS_DESC
    
    call InitDescItem
    
    
    ; initialize GDT pointer struct
    mov eax, 0
    mov ax, ds
    shl eax, 4
    add eax, GDT_ENTRY
    mov dword [GdtPtr + 2], eax

    ; 1. load GDT
    lgdt [GdtPtr]
    
    ; 2. close interrupt
    cli 
    
    ; 3. open A20
    in al, 0x92
    or al, 00000010b
    out 0x92, al
    
    ; 4. enter protect mode
    mov eax, cr0
    or eax, 0x01
    mov cr0, eax
    
    ; 5. load TSS
    mov ax, TSSSelector
    ltr ax
    
    ; 6. jump to 32 bits code
    ; jmp word Code32Selector : 0
    push UserStack32Selector
    push TopOfUserStack32
    push Code32Selector    
    push 0                 
    retf


; esi    --> code segment label
; edi    --> descriptor label
InitDescItem:
    push eax

    mov eax, 0
    mov ax, cs
    shl eax, 4
    add eax, esi
    mov word [edi + 2], ax
    shr eax, 16
    mov byte [edi + 4], al
    mov byte [edi + 7], ah
    
    pop eax
    
    ret

[section .kdat]
[bits 32]
DATA32_KERNEL_SEGMENT:
    KDAT               db  "Kernel Data", 0
    KDAT_LEN           equ $ - KDAT
    KDAT_OFFSET        equ KDAT - $$

Data32KernelSegLen equ $ - DATA32_KERNEL_SEGMENT

[section .udat]
[bits 32]
DATA32_USER_SEGMENT:
    UDAT               times 16 db 0
    UDAT_LEN           equ $ - UDAT
    UDAT_OFFSET        equ UDAT - $$

Data32UserSegLen equ $ - DATA32_USER_SEGMENT

[section .tss]
[bits 32]
TSS_SEGMENT:
        dd    0
        dd    TopOfKernelStack32      ; 0
        dd    KernelStack32Selector   ;
        dd    0                       ; 1
        dd    0                       ;
        dd    0                       ; 2
        dd    0                       ;
        times 4 * 18 dd 0
        dw    0
        dw    $ - TSS_SEGMENT + 2
        db    0xFF
        
TSSLen    equ    $ - TSS_SEGMENT


   
[section .s32]
[bits 32]
CODE32_SEGMENT:
    mov ax, VideoSelector
    mov gs, ax
    
    mov ax, UserData32Selector
    mov es, ax
    
	mov di, UDAT_OFFSET

	call GetKernelDataSelector : 0

	mov ax, UserData32Selector
	mov ds, ax
	mov ebp, UDAT_OFFSET
	mov bx, 0x0c
	mov dh, 12
	mov dl, 33
	call PrintString

    jmp $
    
; ds:ebp    --> string address
; bx        --> attribute
; dx        --> dh : row, dl : col
PrintString:
    push ebp
    push eax
    push edi
    push cx
    push dx
    
print:
    mov cl, [ds:ebp]
    cmp cl, 0
    je end
    mov eax, 80
    mul dh
    add al, dl
    shl eax, 1
    mov edi, eax
    mov ah, bl
    mov al, cl
    mov [gs:edi], ax
    inc ebp
    inc dl
    jmp print

end:
    pop dx
    pop cx
    pop edi
    pop eax
    pop ebp
    
    ret

Code32SegLen    equ    $ - CODE32_SEGMENT


[section .func]
[bits 32]
FUNCTION_SEGMENT:

; es:di --> data buffer 
GetKernelDataFunc:
	mov cx, [esp + 4]
	and cx, 0x03
	mov ax, es  
	and ax, 0xfffc
	or ax, cx
	mov es, ax

    mov ax, KernelData32Selector
    mov ds, ax
    
    mov si, KDAT_OFFSET
    
    mov cx, KDAT_LEN
    
    call KMemCpy
    
    retf

; ds:si --> source
; es:di --> destination
; cx    --> length
KMemCpy:
	mov ax, es
	call CheckRPL

	cmp si, di
	ja btoe
	
	add si, cx
	add di, cx
	dec si
	dec di
	jmp etob

btoe:
	cmp cx, 0
	jz done
	mov al, [ds:si]
	mov byte [es:di], al
	inc si
	inc di
	dec cx
	jmp btoe
	
etob:
	cmp cx, 0
	jz done
	mov al, [ds:si]
	mov byte [es:di], al
	dec si
	dec di
	dec cx
	jmp etob	

done:
	ret

; ax    -->    Selector value
CheckRPL:
	and ax, 0x0003
	cmp ax, SA_RPL0
	jz valid

	mov ax, 0
	mov fs, ax
	mov byte [fs : 0], 0

valid:
	ret

GetKernelData    equ   GetKernelDataFunc - $$
FunctionSegLen    equ   $ - FUNCTION_SEGMENT

[section .kgs]
[bits 32]
STACK32_KERNEL_SEGMENT:
    times 256 db 0
    
Stack32KernelSegLen equ $ - STACK32_KERNEL_SEGMENT
TopOfKernelStack32  equ Stack32KernelSegLen - 1

[section .ugs]
[bits 32]
STACK32_USER_SEGMENT:
    times 256 db 0
    
Stack32UserSegLen equ $ - STACK32_USER_SEGMENT
TopOfUserStack32  equ Stack32UserSegLen - 1

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值