-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim for Virtuozzo Linux #406
Comments
I'm not an official reviewer, I just want to reduce some of the workload of the official reviewers:
|
No we are not it is installed on the encrypted VM in protected perimeter. And only limited personel have access to it. |
Can you explain more in details? what is the security process, anything FIPS 140-2 level2 certified? what's the role of HashiCorp? put as much details as you can please. seems like you are building based on RHEL9, do you provide UKI kernel? if so, what SBAT entries are in the efi? |
To provide secured access to private keys we have installed the VM with software defined encryption on its disk. As for UKI image we are still investigating whether it is necessary(It is built but not signed yet). However in case we do it would look like(based on what kernel guys now working on):
|
@AVasiljev so you aren't using HSM to store the keys? |
Currently not. LEt me know if it is must. |
It is actually https://techcommunity.microsoft.com/t5/hardware-dev-center/updated-uefi-signing-requirements/ba-p/1062916 |
Got. It. we will move to some YUbiKey based then(less convenient but whatever needed). Should I consider the previously used keys as compromised and reiisue the new ones and then resubmit or it is OK if I will just move existing keys to YUBIKEY? |
I would reissue new keys and new CA cert and keys in a secure environment just to be sure that nothing is compromised, I don't use hashicorp, but I think it does support using HSM so you can still build on top of you existing infrastructure, however, this is also up to you as long as you show a deep understanding of the security concepts applied along side knowing how bad this would be if it's compromised. Some personal pointers " nothing here you -should-" do , just more of guide:
However, make sure that whatever HSM you use is the FIPS certified one " will be slightly more expensive and in case of yubihsm2 you need to enable the FIPS mode" MSFT requirements states that the whole environment / operation should be FIPS certified, however, not everyone can achieve this! and the feedback I got , do as much as you can to secure the keys and the build environment with the FIPS HSM , locked environment, monitored is the bare minimum Hope this helps, let me know if you need any clarification |
That is exactly what I have planned to do. Speaking frankly the idea of Hashicorp was to provide some kind of personless access to the tokens however since all the infrastructure is virtual in our company(we are hypervisor developers) probably a USB device connected directly to the building environment would something more appropriate. Probably I will need a bunch of days/weeks to reinvent signing process for us to ensure no person will have a signgle person access. Is this OK I will continue that submission or we should open new one once the HSM will be implemented? |
Make sure that the secureboot building instances have proper security measure in place. You can keep updating the same shim review, make sure to update the hash in the issue and the readme file, take your time, once you are really, we will pick up this review again for review |
I'm lucky bastard. Our IT dept. did had the FIPS enabled Yubikey 4 in stock. Anyways I have requested more recent YubikeyHSM2 for next iteration. Now it is connected directly to the secure environment building grub/kernel/shim/etc. Reissued all the certificates and added those to Yubikey storage. Updated the submission repo. So if I haven't screwed up anywhere we can continue sir. |
Just to confirm, your new CA's key is stored in FIPS key, that shouldn't be easily accessible unless you want to generate new certs / keys for signing .efi files? in other words, I hope that the CA's key is not hosted in the same yubikey 4 that is plugged into the secure build env. |
Nope that is different Yubikey which is not connected anywhere now. |
@AVasiljev just to make things clear and avoid any confusion, could you tag the latest modification? seems like you modifications are in main without a tag at the moment, once you retag, update the issue with the tag you would it like it to be reviewed |
@SherifNagy done. Sorry missed this thing. |
Here I am again coming with more questions / notes:
Would difficult would be to sort out 1st and 2nd note? |
Hey @SherifNagy Will certainly do. Denis is head of Kernel/HyperVisor development. So will reach him once he will come back from PTO(early May is always time for vacations here). |
@SherifNagy Denis renewed his key. NOt often uses the signature AFAIK. And of course we crossigned the keys and published to ubuntu server. Is that OK? |
@AVasiljev great, can you just update and retag the review? don't forget to add the UKI info as well. Once this is done, I will run a quick contact verification and go ahead with the review. One clarification about Denis's relationship toe Virtuozzo, when you said Head of kernel/HyperVisor development, you mean he is already employed by virtuozzo? |
@SherifNagy I have added my estimation for SBAT section to Readme but currently it is not built. |
As for Denis - he is one of co-founders of the company and working for company since it was only OpenVZ product like early 2000s. Now we have both commercial Virtuozzo and OpenVZ in place. And he is still main developer for Kernel/Hypervisor. |
@SherifNagy Just to ensure You have seen that. I have retagged the proper commit. I'm not sure if my UKI answer suits. But that is the state of art now. If necessary to build this immediately signed - please let me know. |
Saw it, just a bit swamped with other things, will get back to you hopefully later in the day |
No worries, just wanted to be sure no action is expected from me. That is my first submission and I'm pretty unsure on if I'm doing proper stuff sir. |
Yikes. Will tommorow. Our new SafeNet FIPS key will be installed tommorow. |
@SherifNagy I have reissued thecertificates and those are now stored on the newly requested SafeNet key. I have created 10 years valid cert so should be no issue now. |
@AVasiljev Denis' key is not capable of encryption, which means we can't do the encrypted verification step. Please ask him to regenerate again, or add an encryption-capable subkey, |
Verification mails sent now |
Artem's Vasiliev:
|
Denis V. Lunev: |
Review of virtuozzo-shim-x86_64-20240401
Shim
I think MSFT do review the sha256sum hashes of the binaries thought " Vendor needs to update the issue to match the readme "
GRUB2
Kernel
LGTM, we will need one more reviewer |
Actually since this is new vendor, we will need two extra reviews including one of the trusted reviewers |
@SherifNagy Should we remove the BUG flag? |
@AVasiljev You need to edit the issue and fix the shim hash, it doesn't match what's inside the README in the tag as I mentioned
|
@SherifNagy Ouch. Fixed. Sorry. |
Review of Shim for Virtuozzo LinuxOK
Issues / queries
|
One more review needed |
review for virtuozzo-shim-x86_64-20240401
|
3 good reviews, accepting |
@AVasiljev did you get a signed shim back? |
Yes thank you. EVerithing works perfectly.
Artem Vasiliev | Build System Engineer | Virtuozzo | ***@***.******@***.***>
…________________________________
От: Thore Sommer ***@***.***>
Отправлено: 29 июля 2024 г. 9:20
Кому: rhboot/shim-review ***@***.***>
Копия: Artem Vasiliev ***@***.***>; Mention ***@***.***>
Тема: Re: [rhboot/shim-review] Shim for Virtuozzo Linux (Issue #406)
@AVasiljev<https://github.com/AVasiljev> did you get a signed shim back?
—
Reply to this email directly, view it on GitHub<#406 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/A7DPYG5UKZ3EK52EFZCXHRLZOXUNTAVCNFSM6AAAAABFRMWQY2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDENJVGE2DANJXG4>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
Confirm the following are included in your repo, checking each box:
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/virtuozzo/shim-review/releases/tag/virtuozzo-shim-x86_64-20240401
What is the SHA256 hash of your final SHIM binary?
fa7866274689d8cec54380183e6ebf46fa79c14bf39f4f88c6169a6c9de7834c shimx64.efi
What is the link to your previous shim review request (if any, otherwise N/A)?
N/A
The text was updated successfully, but these errors were encountered: