qubes-doc/developer/services/dom0-secure-updates.rst
Marek Marczykowski-Górecki bbd0337e91
manual fixes
Manual fixes after the conversion tool.
2024-05-21 22:04:12 +02:00

106 lines
4.9 KiB
ReStructuredText
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

===================
Dom0 secure updates
===================
Reasons for Dom0 updates
------------------------
Normally there should be few reasons for updating software in Dom0. This
is because there is no networking in Dom0, which means that even if some
bugs will be discovered e.g. in the Dom0 Desktop Manager, this really is
not a problem for Qubes, because all the third-party software running in
Dom0 is not accessible from VMs or network in any way. Some exceptions
to the above include: Qubes GUI daemon, Xen store daemon, and disk
back-ends (we plan to move the disk backends to untrusted domain in
Qubes 2.0). Of course we believe this software is reasonably secure and
we hope it will not need patching.
However, we anticipate some other situations when updating Dom0 software
might be required:
- Updating drivers/libs for new hardware support
- Correcting non-security related bugs (e.g. new buttons for qubes
manager)
- Adding new features (e.g. GUI backup tool)
Problems with traditional network-based update mechanisms
---------------------------------------------------------
Dom0 is the most trusted domain on Qubes OS, and for this reason we
decided to design Qubes in such a way that Dom0 is not connected to any
network. In fact only certain domains can be connected to a network via
so-called network domains. There can also be more than one network
domain, e.g. in case the user is connected to more than one physically
or logically separated networks.
Secure update mechanism we use in Qubes (starting from Beta 2)
--------------------------------------------------------------
Keeping Dom0 not connected to any network makes it hard, however, to
provide updates for software in Dom0. For this reason we have come up
with the following mechanism for Dom0 updates, which minimizes the
amount of untrusted input processed by Dom0 software:
The update process is initiated by `qubes-dom0-update script <https://github.com/QubesOS/qubes-core-admin-linux/blob/release2/dom0-updates/qubes-dom0-update>`__,
running in Dom0.
Updates (``*.rpm`` files) are checked and downloaded by UpdateVM, which
by default is the same as the firewall VM, but can be configured to be
any other, network-connected VM. This is done by
`qubes-download-dom0-updates.sh script <https://github.com/QubesOS/qubes-core-agent-linux/blob/release2/misc/qubes-download-dom0-updates.sh>`__
(this script is executed using qrexec by the previously mentioned
qubes-dom0-update). Note that we assume that this script might get
compromised and fetch maliciously compromised downloads this is not a
problem as Dom0 verifies digital signatures on updates later. The
downloaded rpm files are placed in a
``/var/lib/qubes/dom0-updates`` directory on UpdateVM
filesystem (again, they might get compromised while being kept there,
still this isnt a problem). This directory is passed to yum using the
``installroot=`` option.
Once updates are downloaded, the update script that runs in UpdateVM
requests an RPM service
`qubes.ReceiveUpdates <https://github.com/QubesOS/qubes-core-admin-linux/blob/release2/dom0-updates/qubes.ReceiveUpdates>`__
to be executed in Dom0. This service is implemented by
`qubes-receive-updates script <https://github.com/QubesOS/qubes-core-admin-linux/blob/release2/dom0-updates/qubes-receive-updates>`__
running in Dom0. The Dom0s qubes-dom0-update script (which originally
initiated the whole update process) waits until qubes-receive-updates
finished.
The qubes-receive-updates script processes the untrusted input from
Update VM: it first extracts the received ``*.rpm`` files (that are sent
over qrexec data connection) and then verifies digital signature on each
file. The qubes-receive-updates script is a security-critical component
of the Dom0 update process (as is the
`qfile-dom0-unpacker.c <https://github.com/QubesOS/qubes-core-admin-linux/blob/release2/dom0-updates/qfile-dom0-unpacker.c>`__
and the rpm utility, both used by the qubes-receive-updates for
processing the untrusted input).
Once qubes-receive-updates finished unpacking and verifying the updates,
the updates are placed in ``qubes-receive-updates`` directory in Dom0
filesystem. Those updates are now trusted. Dom0 is configured (see
/etc/yum.conf in Dom0) to use this directory as a default (and only)
`yum repository <https://github.com/QubesOS/qubes-core-admin-linux/blob/release2/dom0-updates/qubes-cached.repo>`__.
Finally, qubes-dom0-update runs ``yum update`` that fetches the RPMs
from qubes-cached repo and installs them as usual.
Security benefit of our update mechanism
----------------------------------------
The benefit of the above scheme is that one doesnt need to trust the
TCP/IP stack, the HTTP stack, and wget implementation in order to safely
deliver and install updates in Dom0. One only needs to trust a few
hundred lines of code as discussed above, as well as the rpm utility for
properly checking digital signature (but this is required in any update
scheme).