TranslateProject/sources/tech/20191111 3 approaches to secrets management for Flatpak applications.md
DarkSun 86066aa37a 选题: 20191111 3 approaches to secrets management for Flatpak applications
sources/tech/20191111 3 approaches to secrets management for Flatpak applications.md
2019-11-13 01:09:12 +08:00

11 KiB
Raw Blame History

3 approaches to secrets management for Flatpak applications

Flatpak secrets management is getting an upgrade. Here's what's coming. A top secret file.

Flatpak enables desktop applications to run in isolated sandboxes, which significantly improves security as it prevents applications from affecting one another and impacting the host system. In practice, however, typical applications still need to access services and user data that are shared among other applications and the host. This situation has been improved by hardening permissions around the portal mechanism, though there was a long-standing issue: How to manage user secrets.

In this article, we present our approach to managing user secrets for Flatpak applications. While most applications can transparently take advantage of the proposed mechanism, some applications need code modification. The migration steps are also presented.

How secrets are managed on the Linux desktop

On a modern Linux desktop, most of the secrets—passwords, tokens, and so on, with their associated attributes—are centrally managed by the daemon process gnome-keyring-daemon. Applications access this daemon through the Secret Service API, which is exposed through D-Bus. This process is done under the hood if the application is using a client library like libsecret

Note: For the same purpose, there is a library called libgnome-keyring, which is now obsolete. Note that, despite the name, libgnome-keyring is a separate project from gnome-keyring, which is NOT obsolete and still maintains the central role of secrets management.

On the daemon side, the secrets are stored on the filesystem and encrypted. Other than that, the daemon is nothing but a normal storage service, meaning that any application can store data on arbitrary "paths" that other applications can also see. While this model is sufficient as long as we trust all applications, it negates one of Flatpaks security goals: Increase the security of desktop systems by isolating applications from one another.

Therefore, when installing a Flatpak application that uses the Secret Service API, the user is asked to grant the necessary permissions to the application. In the example below, you can see that the application requires access to the Secret Service API (org.freedesktop.secrets). If the user doesnt want to allow this application to access the service, their only option is to forfeit installation:

$ flatpak install org.gnome.Epiphany
…
org.gnome.Epiphany permissions:
        ipc                     network         pulseaudio      wayland
        x11                     dri             file access [1] dbus access [2]
        system dbus access [3]

        [1] xdg-download, xdg-run/dconf, ~/.config/dconf:ro
        [2] ca.desrt.dconf, org.freedesktop.Notifications, org.freedesktop.secrets
        [3] org.freedesktop.GeoClue2
Proceed with these changes to the Default system installation? [Y/n]:

This is clearly an undesirable outcome.

The local storage approach

The basic idea to tackle this problem is to store the secrets on the application side, rather than the host side (gnome-keyring-daemon). This practice is analogous to the recent work on GSettings, where applications store the settings data in a local file instead of in a dconf service running on the host.

When it comes to secrets, however, there is a bootstrapping problem: The application has to encrypt secrets when storing them in a local file, but it doesnt know the encryption key yet. To provision the application with an encryption key, we rely on the Flatpak portal mechanism, which sits between the application and the host to let the two communicate through a restricted interface.

We also added a new portal that allows applications to retrieve encryption keys. First, the application sends a request to the portal (the request contains a Unix file descriptor where the encryption key is written). Then, the portal delegates the request to the back-end implementation in gnome-keyring-daemon, which sends a unique encryption key for the sandboxed application through the file descriptor.

With the received encryption key, the application encrypts the secrets and stores them in the application data directory (~/.var/app/$APPID/data/keyrings), which is bind-mounted and accessible from both the host and the sandbox.

The libsecret API

The libsecret project provides two different sets of APIs. One is the simple API, and the other is the complete API. The former provides simpler, stateless operations for retrieving and storing secrets, while the latter provides a more complete, object-oriented API that maps the D-Bus interface to the C API.

Local storage is only supported in the simple API. If your applications are already using the simple API, then they will automatically use local storage when running under Flatpak. Otherwise, to enable local storage, the applications need to be ported to the simple API. See the migration patch in Epiphany as an example.

Having a distinction between the two API sets also makes it possible for the applications to opt-out from using local storage. For example, if your application is a password manager that needs full access to user keyrings, you can bypass local storage by using the complete API.

The keyring format

Although ideally, we should be able to use the same keyring format for both local storage and gnome-keyring-daemon, we realized that the keyring format used by gnome-keyring-daemon has limitations. Secrets, including associated attributes, are encrypted as a single chunk, meaning that they can consume an unnecessary amount of locked memory. Also, attributes are hashed without a key, meaning that it is possible to guess which secrets are stored in the file.

Therefore, instead of implementing this format in two places, we decided to define a new version of the keyring file format, with the following characteristics: Secrets are encrypted individually and attribute hashes are now a message authentication code (MAC) over the attributes.

This new format is based on the GVariant serialization format, except for the header, and this change allows us to reuse most of the code for encoding, decoding, and lookup.

What's next for Flatpak secrets management

The necessary patches are (currently) only available in the Git repositories of the relevant components (xdg-desktop-portal, gnome-keyring, and libsecret). They will be included in the next releases leading up to GNOME 3.36.

If you are a developer, there is still room for improvement in this area. Here is where your help would be greatly appreciated:

  • Session keyrings: The Secret Service API supports "session" keyrings, which only last for the duration of the user session. The local storage backend doesnt support this feature yet. This code could be implemented using the session keyring in the Linux kernel.

  • Management and backup application: Application secrets are now stored in multiple locations, and not just the host keyrings. It would be useful if there were a tool to manage application secrets and make backups. This process should be possible by enhancing GNOMEs Seahorse to look at application secrets.

  • Online accounts portal: These days, it is common for web applications to be integrated with web-based access delegation protocols such as OAuth 2.0. These protocols are supported by gnome-online-accounts, which in turn uses gnome-keyring-daemon for storing the tokens. A portal interface for online accounts would be useful for restricting access per application.

  • Wider adoption of the new keyring format: While the new format has several advantages, it is currently only used by libsecret on the application side. It would be beneficial if gnome-keyring-daemon on the host side also used the same format.

  • Hardening the reinstall process: By default, the applications keyring file (~/.var/app/$APPID/data/keyrings) persists after uninstall, along with other data. This persistence is vulnerable in case the application ID is reused by an untrusted publisher. Currently, we recommend using the --delete-data option to ensure that such application data is removed. This procedure could be improved if a publishers ID was associated with the application.

Summary

This article presented a mechanism to provision Flatpak applications with user secrets. This mechanism was designed based on the following principles:

  • Minimize the host interface.
  • Let applications interact with the host through a Flatpak portal.
  • Store the application data in a common data format.

Although the mechanism is transparent, as long as you use libsecret, the mechanism is only enabled through libsecrets simple API. For a smoother transition, we suggest migrating applications to this API. More information about the projects background and the design rationale is available in the GUADEC presentation (slides, recording).

Fragmentation is a longstanding Achilles heel for the Linux desktop. In a world of myriad...


via: https://opensource.com/article/19/11/secrets-management-flatpak-applications

作者:Daiki Ueno 选题:lujun9972 译者:译者ID 校对:校对者ID

本文由 LCTT 原创编译,Linux中国 荣誉推出