Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Encryption Operating Systems Security

Secure Private Key Storage for UNIX? 95

An anonymous reader asks: "Microsoft Windows, from 2000 forward (except ME) offers secure certificate and private storage at the OS level in what is called a protected store. Offline, it's encrypted by a combination of the user's password and a session key stored on the filesystem. When the OS is running, the private keys stored are available to the logged in user, optionally encrypted with another password. The keys are stored in protected memory, so no applications can access them without going through the Microsoft CAPI calls. This code also is FIPS 140-1 level 1 (the best one can get for software cryptography modules) compliant." Does any other OS provide this kind of feature at the OS-level? If so, who? If not, why?
This functionality (especially certified FIPS 140-1 or FIPS 140-2) would be nice to see in UNIX variants. MacOS's key-chain functionality is similar, but stores at the application level, and is not FIPS compliant. An implementation of the protected store functionality will allow applications like Firefox, Thunderbird and gpg to have one common place to obtain private keys and certificates rather than maintaining their own individual key-stores. An additional application for this would be the ability to use hardware PKCS #11 tokens.

I am wondering why this functionality does not exist at the OS level in most OSes except Windows. A number of applications on many platforms have this functionality, but its at the app level, with their own key-stores, and not a standard at the OS level."
This discussion has been archived. No new comments can be posted.

Secure Private Key Storage for UNIX?

Comments Filter:
  • by Anonymous Coward on Thursday March 01, 2007 @08:13PM (#18201318)
    On OS X, the keychain data (certificates, keys, etc) is not managed at the application level. There is a system daemon, securityd, that applications talk to if they need passwords or need data signed / decrypted or if they need credentials for a particular service.
  • by dgatwood ( 11270 ) on Thursday March 01, 2007 @08:18PM (#18201384) Homepage Journal

    I'm not sure what they're trying to claim here, but unless their definition of OS means "kernel", the Mac OS X (and classic Mac OS, AFAIK) keychain most certainly is an OS-level service. Keychain items can be shared among all applications, though most applications limit access to these items to a list of trusted applications for obvious security reasons.

    I don't know about the question of protected memory or FIPS certification, but the rest of this question just seemed like FUD to me.

  • Re:Well duh.. (Score:3, Informative)

    by RollingThunder ( 88952 ) on Thursday March 01, 2007 @08:18PM (#18201386)
    I'm pretty sure that Sun, IBM, and HP sell their UNIX systems to the government, and centrally develop those too.

    He didn't specify Linux, he said UNIX.
  • chmod 600 (Score:2, Informative)

    by Anonymous Coward on Thursday March 01, 2007 @08:19PM (#18201406)
    chmod 600 crypt.key

    Just make sure to store the key encrypted with a passphrase :)
  • by Straker Skunk ( 16970 ) on Thursday March 01, 2007 @08:24PM (#18201458)
    Same idea in KDE, and I'm sure GNOME has a similar mechanism. Whether these are "OS-level" or "application-level" is a subtler question, but this has more to do with the situation that Linux desktop systems don't necessarily have a centrally-planned infrastructure in the manner of Windows or MacOS X, rather than that they haven't addressed this problem at all.
  • No (Score:5, Informative)

    by John.P.Jones ( 601028 ) on Thursday March 01, 2007 @08:41PM (#18201666)
    OpenSSL was just certified FIPS 140-2, that is NOT however level 2 it is version 2 of the standard. It was certified FIPS 140-2 level 1.
  • by omnirealm ( 244599 ) on Thursday March 01, 2007 @08:49PM (#18201742) Homepage
    Current versions of the Linux kernel have a key retention [lkml.org] feature. For PKCS#11, there is openCryptoki [sourceforge.net].
  • Re:Eggs and baskets (Score:5, Informative)

    by Just Some Guy ( 3352 ) <kirk+slashdot@strauser.com> on Thursday March 01, 2007 @09:06PM (#18201930) Homepage Journal

    Maybe it's just me, but I think that putting all your eggs in one basket is not smart. All it would take would be on critical vulnerability to be discovered and all of a sudden a potential attacker can get to all of your keys. Not good if you ask me.

    I disagree. Right now, we're putting all our eggs in a bunch of half-assed baskets woven from tissue paper and lunchmeat. I'd much rather trust one well-audited, well-engineered solution than the 100 home rolled ones we have to trust now.

    KDE does this now with KWallet (although without the spiffy kernel-level protections the author claims that Windows supports). If I'm writing a KDE application, I don't have to worry about getting password storage right - some other folks who know a whole lot more about the problem have already taken care of it for me.

    I think this is good in the same way that using libc's strncmp is better than writing your own. Sure, there might be some undiscovered flaw lurking that's just waiting to open our systems to the world, and an environment of heterogeneous strncmp implementations would keep a successful attack from owning everything that links to libc. And yet, I have a lot of faith that the libc version is much better than anything I'm likely to come up with on my own.

    Finally, if an error in strncmp were to be discovered, an upgrade of one library file would fix every dynamically linked program on my system. If each of those programs used their own, then each one would have to be audited to make sure they weren't broken in a similar way. In the same way, an upgrade to KWallet helps every program that uses it. Other programs have to hope that new vulnerabilities are specific to KWallet's own code and not a more general problem.

    The Unix way is to build a tool that does one thing supremely well, then trust it. I think this is a prime candidate for the same treatment.

    By the way, I'm only using KWallet as an example because I'm familiar with it; I'd be even more interested in Theo de Raadt getting a wild hair and writing OpenSecureStore some weekend.

  • by Anonymous Coward on Friday March 02, 2007 @07:38AM (#18205332)

    On Windows, I believe you can "attach" to a running process with a debugger. On Unix, if you want to debug, you have to start the app in a debugger, because once it's running, the app's memory is its own. Only way you can "attach" then is if the app specifically has a way to do that -- for instance, browser plugins are essentially an app deliberately loading
    code from somewhere else into itself and running it. But if an app doesn't go out of its way to let you in, you aren't getting in, and if your kernel is owned, so are you, even on Windows.
    huh?

    what about
      strace -p pid
      gdb program pid
  • SanityInAnarchy has apparently not been doing a lot of development in a UNIX environment. While I don't blame him/her for potentially missing out on the ptrace syscall, as it's not mentioned in Stevens' Advanced Programming in the UNIX Environment, I do find it a bit sad that he/she makes such bold statements about the security of a computer system without checking at least the valid command line parameters to one of the tools he is referring to. Luckily an Anonymous Coward already told the world about two of these.

    For those not familiar with the ptrace syscall, here is some info about linux ptrace:

    • You have to have super-user privileges, CAP_SYS_PTRACE capabilities or be able to send signals to the process to "attach to". The first parts means you is or have the permission of the system administrator or compromised the system. The last part basically means that you can also poke around at will in "your own" (or all processes for the same user account you've hacked) processes.
    • It is possible to read and write all process memory and registers. Basically, this means that you can run, you can obfuscate, but you cannot hide your crypto keys. Not from yourself or a particularly Evil sysadm, that is.
    • Even if the traced process receives a signal from the tracing, it is already too late to do anything about it once it regains control over it's operation.

    Detecting that you're being traced is possible, but it equally possible to circumvent possible detection by tracing at the correct time, deliver spoofed signals, modifying memory in the traced process to avoid being detected. In short: if you cannot trust your system administrator and yourself (at least all processes running as you) you are out of luck as to local security. Network security is one step worse, in that you have to trust even more persons.

    Oh, and don't use trustno1 as password!

  • Re:Well duh.. (Score:3, Informative)

    by jimstapleton ( 999106 ) on Friday March 02, 2007 @09:16AM (#18205848) Journal
    So, is this just a hallucination?

    HP has 3 (4?) flavors of UNIX:
    http://welcome.hp.com/country/us/en/prodserv/serve rs.html [hp.com]
    HP-UX, Linux, Tru64

    They also have UnixWare, though I'm not sure if that's UNIX or an application suite for UNIX, or something that is "kinda like but not really" UNIX.

    VMS is not UNIX, so I won't count that.

    Given that these are "for sale", I don't think "dead" is quite the appropriate term.
    You can drop out Linux since it's not a IBM creation, reducing their number of Unix OSes by 1, but that's still a positive number.

    We use all of the above (except UnixWare) and many more where I work, in various places (LARGE organization).

    As for IBM, AIX and Linux. I5 might be a Unix OS also, but I'm not familiar with it.
    http://www-03.ibm.com/systems/i/os/ [ibm.com]

    Also for sale. And AIX is also still used (they have AIX server in various places in the organization where I work also)

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...