Skip to content

Latest commit

 

History

History
181 lines (129 loc) · 11.7 KB

6_embedded_framework_and_c-based_toolchain_hardeni.md

File metadata and controls

181 lines (129 loc) · 11.7 KB

Embedded Framework and C-Based Toolchain Hardening

Limit BusyBox, embedded frameworks, and toolchains to only those libraries and functions being used when configuring firmware builds. Embedded Linux build systems such as Buildroot, Yocto and others typically perform this task. Removal of known insecure libraries and protocols such as Telnet not only minimize attack entry points in firmware builds, but also provide a secure-by-design approach to building software in efforts to thwart potential security threats.

Hardening a library Example: It is known that compression is insecure (amongst others),SSLv2 is insecure, SSLv3 is insecure, as well as early versions of TLS . In addition, suppose you don't use hardware and engines, and only allow static linking. Given the knowledge and specifications, you would configure the OpenSSL library as follows:

$ Configure darwin64-x86_64-cc -no-hw -no-engine -no-comp -no-shared -no-dso -no-ssl2 -no-ssl3 --openssldir=

Selecting one shell Example: Utilizing buildroot, the screenshot below demonstrates only one Shell being enabled, bash. (Note: Buildroot examples are shown below but there are other ways to accomplish the same configuration with other embedded Linux build systems.)\

Hardening Services Example: The screenshot below shows openssh enabled but not FTP daemons proftpd and pure-ftpd. Only enable FTP if TLS is to be utilized. For example, proftpd and pureftpd require custom compilation to use TLS with mod_tls for proftpd and passing ./configure --with-tls for pureftpd.

Hardening Das U-boot Example: Often, physical access to an embedded device enables attack paths to modify bootloader configurations. Below, example best practice configurations for uboot_config are provided_. Note: The_ uboot_config file is typically auto generated depending on the build environment and specific board.

Configure "Verified Boot" (secure boot) for U-Boot 2013.07 versions and above. Verified Boot is not enabled by default and requires board support with the below configurations required at the minimum.

CONFIG_ENABLE_VBOOT=y #Enables Verified Boot

CONFIG_FIT_SIGNATURE=y #Enables signature verification of FIT images.

CONFIG_RSA=y #Enables RSA algorithm used for FIT image verification

CONFIG_OF_SEPARATE=y #Enables separate build of u-Boot from the device tree.

CONFIG_FIT=y #Enables support for Flat Image Tree (FIT) uImage format.

CONFIG_OF_CONTROL=y #Enables Flattened Device Tree (FDT) configuration.

CONFIG_OF_LIBFDT=y

CONFIG_DEFAULT_DEVICE_TREE=y #Specifies the default Device Tree used for the run-time configuration of U-Boot.

Afterwards, a series of steps are needed for configuring Verified Boot. An example overview of building Verified Boot for a Beaglebone black board is:

  1. Build U-Boot for the board, with the verified boot options enabled.
  2. Obtain a suitable Linux kernel (preferably the latest)
  3. Create a Image Tree Source file (ITS) file describing how you want the kernel to be packaged, compressed and signed.
  4. Create an RSA key pair with RSA2048 and use SHA256 hashing algorithm for authentication (store your private key in a safe place and not hardcoded into firmware)
  5. Sign the kernel
  6. Put the public key into U-Boot's image
  7. Put U-Boot and the kernel onto the board
  8. Test the image and boot configurations

In addition to the above, make the applicable configurations valid to the context of your embedded device. Below are notable configurations that can be made.

CONFIG_BOOTDELAY -2. #Prevents access to u-boot's console when auto boot is used

CONFIG_CMD_USB=n #Disables basic USB support and the usb command

CONFIG_USB_UHCI: defines the lowlevel part.

CONFIG_USB_KEYBOARD: enables the USB Keyboard

CONFIG_USB_STORAGE: enables the USB storage devices

CONFIG_USB_HOST_ETHER: enables USB ethernet adapter support

Disabling serial console output in U-Boot via the following configuration macros:

CONFIG_SILENT_CONSOLE

CONFIG_SYS_DEVICE_NULLDEV

CONFIG_SILENT_CONSOLE_UPDATE_ON_RELOC

To enable immutable U-boot environment variables to prevent unauthorized changes (e.g. Modifying bootargs, updating verified boot public keys etc.) or side-loading of firmware, remove non-volatile memory settings such as the following:

#define CONFIG_ENV_IS_IN_MMC

#define CONFIG_ENV_IS_IN_NAND

#define CONFIG_ENV_IS_IN_NVRAM

#define CONFIG_ENV_IS_IN_SPI_FLASH

#define CONFIG_ENV_IS_IN_REMOTE

#define CONFIG_ENV_IS_IN_EEPROM

#define CONFIG_ENV_IS_IN_FLASH

#define CONFIG_ENV_IS_IN_DATAFLASH

#define CONFIG_ENV_IS_IN_MMC

#define CONFIG_ENV_IS_IN_FAT

#define CONFIG_ENV_IS_IN_ONENAND

#define CONFIG_ENV_IS_IN_UBI

Considerations (Disclaimer: The List below is non-exhaustive):

  • Ensure services such as SSH have a secure password created.

  • Remove unused language interpreters such as: perl, python, lua.

  • Remove dead code from unused library functions.

  • Remove unused shell interpreters such as: ash, dash, zsh.

    • Review /etc/shell
  • Remove legacy insecure daemons which includes but not limited to:

    • telnetd
    • ftpd
    • ftpget
    • ftpput
    • tftp
    • rlogind
    • rshd
    • rexd
    • rcmd
    • rhosts
    • rexecd
    • rwalld
    • rbootd
    • rusersd
    • rquotad
    • rstatd
    • nfs
  • Remove unused/unnecessary utilities such as:

    • sed, wget, curl, awk, cut, df, dmesg, echo, fdisk, grep, mkdir, mount (vfat), printf, tail, tee, test (directory), test (file), head, cat

    Automotive Grade Linux (AGL) has developed an example table of common utilities and their usage for debug or production environments (builds).

Utility Name Location Debug Environment Production Environment
Strace /bin/trace INCLUDE EXCLUDE
Klogd /sbin/klogd INCLUDE EXCLUDE
Syslogd(logger) /bin/logger INCLUDE EXCLUDE
Gdbserver /bin/gdbserver INCLUDE EXCLUDE
Dropbear Remove “dropbear” from ‘/etc/init.d/rcs’ EXCLUDE EXCLUDE
SSH NA INCLUDE EXCLUDE
Editors (vi) /bin/vi INCLUDE EXCLUDE
Dmesg /bin/dmesg INCLUDE EXCLUDE
UART /proc/tty/driver/ INCLUDE EXCLUDE
Hexdump /bin/hexdump INCLUDE EXCLUDE
Dnsdomainname /bin/dnsdomainname EXCLUDE EXCLUDE
Hostname /bin/hostname INCLUDE EXCLUDE
Pmap /bin/pmap INCLUDE EXCLUDE
su /bin/su INCLUDE EXCLUDE
Which /bin/which INCLUDE EXCLUDE
Who and whoami /bin/whoami INCLUDE EXCLUDE
ps /bin/ps INCLUDE EXCLUDE
lsmod /sbin/lsmod INCLUDE EXCLUDE
install /bin/install INCLUDE EXCLUDE
logger /bin/logger INCLUDE EXCLUDE
ps /bin/ps INCLUDE EXCLUDE
rpm /bin/rpm INCLUDE EXCLUDE
Iostat /bin/iostat INCLUDE EXCLUDE
find /bin/find INCLUDE EXCLUDE
Chgrp /bin/chgrp INCLUDE EXCLUDE
Chmod /bin/chmod INCLUDE EXCLUDE
Chown /bin/chown INCLUDE EXCLUDE
killall /bin/killall INCLUDE EXCLUDE
top /bin/top INCLUDE EXCLUDE
stbhotplug /sbin/stbhotplug INCLUDE EXCLUDE
  • Utilize tools such as Lynis for hardening auditing and suggestions. wget --no-check-certificate https://github.com/CISOfy/lynis/archive/master.zip && unzip master.zip && cd lynis-master/ && bash lynis audit system
    • Review the report in: /var/log/lynis.log
  • Perform iterative threat model exercises with developers as well as relative stakeholders on software running on the embedded device.

Additional References