VirtualBox

Ignore:
Timestamp:
Oct 26, 2015 12:33:42 AM (9 years ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
103644
Message:

SUPR3HardenedMain.cpp: @page pg_hardening updates.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/HostDrivers/Support/SUPR3HardenedMain.cpp

    r58405 r58406  
    2525 */
    2626
    27 /** @page pg_hardening      VirtualBox VM Process Hardening
    28  *
    29  * The VM process hardening is to prevent malicious software from using
    30  * VirtualBox as a vehicle to obtain kernel level access.
    31  *
    32  * The VirtualBox VMM requires supervisor (kernel) level access to the CPU.  For
    33  * both practical and historical reasons, part of the VMM is realized in ring-3,
    34  * with a rich interface to the kernel part.  While the device emulations can be
    35  * executed exclusively in ring-3, we have performance optimizations that loads
    36  * device emulation code into ring-0 and our special raw-mode execution context
    37  * (none VT-x/AMD-V mode) for handling frequent operations a lot more
    38  * efficiently.  These share data between all three context (ring-3, ring-0 and
    39  * raw-mode).  All this poses a rather broad attack surface, which the hardening
    40  * protects.
     27/** @page pg_hardening      %VirtualBox %VM Process Hardening
     28 *
     29 * The %VM process hardening is to prevent malicious software from using
     30 * %VirtualBox as a vehicle to obtain kernel level access.
     31 *
     32 * The %VirtualBox %VMM requires supervisor (kernel) level access to the CPU.
     33 * For both practical and historical reasons, part of the %VMM is realized in
     34 * ring-3, with a rich interface to the kernel part.  While the device
     35 * emulations can be executed exclusively in ring-3, we have performance
     36 * optimizations that loads device emulation code into ring-0 and our special
     37 * raw-mode execution context (none VT-x/AMD-V mode) for handling frequent
     38 * operations a lot more efficiently.  These share data between all three
     39 * context (ring-3, ring-0 and raw-mode).  All this poses a rather broad attack
     40 * surface, which the hardening protects.
    4141 *
    4242 * The hardening focuses primarily on restricting access to the support driver,
     
    4444 * instigator of the communication between ring-3 and the ring-0 and raw-mode
    4545 * contexts.  A secondary focus is to make sure malicious code cannot be loaded
    46  * and executed in the VM process.  Exactly how we go about this depends a lot
     46 * and executed in the %VM process.  Exactly how we go about this depends a lot
    4747 * on the host OS.
    4848 *
     
    5757 *        systems.
    5858 *      - \\Device\\VBoxDrvStub on Windows for protecting the second stub
    59  *        process and its child, the VM process.  This is an open+close
     59 *        process and its child, the %VM process.  This is an open+close
    6060 *        interface, only available to partially verified stub processes.
    6161 *      - \\Device\\VBoxDrvErrorInfo on Windows for obtaining detailed error
     
    6464 *
    6565 * The rest of VBox accesses the device interface thru the support library,
    66  * SUPR3 / sup.h.
     66 * @ref grp_sup "SUPR3" / sup.h.
    6767 *
    6868 * The support driver also exposes a set of functions and data that other VBox
    6969 * ring-0 modules can import from.  This includes much of the IPRT we need in
    70  * the ring-0 part of the VMM and device emulations.
    71  *
    72  * The ring-0 part of the VMM and device emulations are loaded via the
    73  * SUPR3LoadModule and SUPR3LoadServiceModule support library function, which
     70 * the ring-0 part of the %VMM and device emulations.
     71 *
     72 * The ring-0 part of the %VMM and device emulations are loaded via the
     73 * #SUPR3LoadModule and #SUPR3LoadServiceModule support library function, which
    7474 * both translates to a sequence of I/O controls against /dev/vboxdrv.  On
    7575 * Windows we use the native kernel loader to load the module, while on the
     
    8888 * checks that the effective user ID (EUID) is root when it is being opened.
    8989 *
    90  * The VM processes temporarily assume root privileges using the set-uid-bit on
     90 * The %VM processes temporarily assume root privileges using the set-uid-bit on
    9191 * the executable with root as owner.  In fact, all the files and directories we
    9292 * install are owned by root and the wheel (or equivalent gid = 0) group,
     
    9696 * unnecessary library dependencies (only libc, pthreads, dynamic linker) and
    9797 * simply calls #SUPR3HardenedMain.  It does the following:
    98  *      1. Validate the VirtualBox installation (supR3HardenedVerifyAll):
     98 *      1. Validate the VirtualBox installation (#supR3HardenedVerifyAll):
    9999 *          - Check that the executable file of the process is one of the known
    100100 *            VirtualBox executables.
     
    110110 *
    111111 *      2. Open a file descriptor for the support device driver
    112  *         (supR3HardenedMainOpenDevice).
     112 *         (#supR3HardenedMainOpenDevice).
    113113 *
    114114 *      3. Grab ICMP capabilities for NAT ping support, if required by the OS
    115  *         (supR3HardenedMainGrabCapabilites).
    116  *
    117  *      4. Correctly drop the root privileges (supR3HardenedMainDropPrivileges).
     115 *         (#supR3HardenedMainGrabCapabilites).
     116 *
     117 *      4. Correctly drop the root privileges
     118 *         (#supR3HardenedMainDropPrivileges).
    118119 *
    119120 *      5. Load the VBoxRT dynamic link library and hand over the file
    120121 *         descriptor to the support library code in it
    121  *         (supR3HardenedMainInitRuntime).
    122  *
    123  *      6. Load the dynamic library containing the actual VM front end code and
    124  *         run it (tail of SUPR3HardenedMain).
     122 *         (#supR3HardenedMainInitRuntime).
     123 *
     124 *      6. Load the dynamic library containing the actual %VM front end code and
     125 *         run it (tail of #SUPR3HardenedMain).
    125126 *
    126127 * The set-uid-to-root stub executable is paired with a dynamic link library
    127  * which export one TrustedMain entry point (see FNSUPTRUSTEDMAIN) that we call.
    128  * In case of error reporting, the library may also export a TrustedError
    129  * function (FNSUPTRUSTEDERROR).
     128 * which export one TrustedMain entry point (see #FNSUPTRUSTEDMAIN) that we
     129 * call. In case of error reporting, the library may also export a TrustedError
     130 * function (#FNSUPTRUSTEDERROR).
    130131 *
    131132 * That the set-uid-to-root-bit modifies the dynamic linker behavior on all
     
    142143 * In addition to what the dynamic linker does for us, the VirtualBox code will
    143144 * not directly be calling either RTLdrLoad or dlopen to load dynamic link
    144  * libraries into the process.  Instead it will call SUPR3HardenedLdrLoad,
    145  * SUPR3HardenedLdrLoadAppPriv and SUPR3HardenedLdrLoadPlugIn to do the loading.
    146  * These functions will perform the same validations on the file being loaded as
    147  * SUPR3HardenedMain did in its validation step.  So, anything we load must be
    148  * installed with root/wheel as owner/group, the directory we load it from must
    149  * also be owned by root:wheel and now allow for renaming the file.  Similar
    150  * ownership restrictions applies to all the parent directories (except on
    151  * darwin).
     145 * libraries into the process.  Instead it will call #SUPR3HardenedLdrLoad,
     146 * #SUPR3HardenedLdrLoadAppPriv and #SUPR3HardenedLdrLoadPlugIn to do the
     147 * loading. These functions will perform the same validations on the file being
     148 * loaded as #SUPR3HardenedMain did in its validation step.  So, anything we
     149 * load must be installed with root/wheel as owner/group, the directory we load
     150 * it from must also be owned by root:wheel and now allow for renaming the file.
     151 * Similar ownership restrictions applies to all the parent directories (except
     152 * on darwin).
    152153 *
    153154 * So, we place the responsibility of not installing malicious software on the
     
    170171 * pointless, even if Windows had one.
    171172 *
    172  * So, in order to protect access to the support driver and protect the
    173  * VM process while it's running we have to do a lot more work.  A keystone in
    174  * the defences is cryptographic code signing.  Here's the short version of what
    175  * we do:
     173 * So, in order to protect access to the support driver and protect the %VM
     174 * process while it's running we have to do a lot more work.  A keystone in the
     175 * defences is cryptographic code signing.  Here's the short version of what we
     176 * do:
    176177 *      - Minimal stub executable, signed with the same certificate as the
    177178 *        kernel driver.
     
    212213 *
    213214 * We share the stub executable approach with the UNIX-like systems, so there's
    214  * the SUPR3HardenedMain calling stub executable with it's parenter DLL
    215  * exporting TrustedMain and TrustedError.   However, the stub executable does a
    216  * lot more, while doing it in a more bare metal fashion:
     215 * the #SUPR3HardenedMain calling stub executable with its partner DLL exporting
     216 * TrustedMain and TrustedError.   However, the stub executable does a lot more,
     217 * while doing it in a more bare metal fashion:
    217218 *      - It does not use the Microsoft CRT, what we need of CRT functions comes
    218219 *        from IPRT.
     
    227228 * The initial stub process is not really to be trusted, though we try our best
    228229 * to limit potential harm (user mode debugger checks, disable thread creation).
    229  * So, when it enters SUPR3HardenedMain we only call supR3HardenedVerifyAll to
     230 * So, when it enters #SUPR3HardenedMain we only call #supR3HardenedVerifyAll to
    230231 * verify the installation (known executables and DLLs, checking their code
    231232 * signing signatures, keeping them all open to deny deletion and replacing) and
    232  * does a respawn via supR3HardenedWinReSpawn.
     233 * does a respawn via #supR3HardenedWinReSpawn.
    233234 *
    234235 *
     
    238239 * thread is suspended before it executes a single instruction.  It is also
    239240 * created with a less generous ACLs, though this doesn't protect us from admin
    240  * users.  In order for SUPR3TrustedMain to figure that it is the second stub
     241 * users.  In order for #SUPR3HardenedMain to figure that it is the second stub
    241242 * process, the zeroth command line argument has been replaced by a known magic
    242243 * string (UUID).
     
    244245 * Now, before the process starts executing, the parent (initial stub) will
    245246 * patch the LdrInitializeThunk entry point in NTDLL to call
    246  * supR3HardenedEarlyProcessInit via supR3HardenedEarlyProcessInitThunk.  The
    247  * parent will also plant some synchronization stuff via g_ProcParams (NTDLL
     247 * #supR3HardenedEarlyProcessInit via #supR3HardenedEarlyProcessInitThunk.  The
     248 * parent will also plant some synchronization stuff via #g_ProcParams (NTDLL
    248249 * location, inherited event handles and associated ping-pong equipment).
    249250 *
     
    259260 * the process is created or/and starts executing the first instruction.  But we
    260261 * can easily counter these as we have a known process state we can restore. So,
    261  * the first thing that supR3HardenedEarlyProcessInit does is to signal the
     262 * the first thing that #supR3HardenedEarlyProcessInit does is to signal the
    262263 * parent to  perform a child purification, so the potentially evil influences
    263264 * can be exorcised.
    264265 *
    265266 * What the parent does during the purification is very similar to what the
    266  * kernel driver will do later on when verifying the second stub and the VM
     267 * kernel driver will do later on when verifying the second stub and the %VM
    267268 * processes, except that instead of failing when encountering an shortcoming it
    268269 * will take corrective actions:
     
    272273 *        stub executable and NTDLL) will be compared to the pristine fixed-up
    273274 *        copy prepared by the IPRT PE loader code, restoring any bytes which
    274  *        appears differently in the child.  (g_ProcParams (SUPR3WINPROCPARAMS)
    275  *        is exempted, LdrInitializeThunk is set to call NtTerminateThread.)
     275 *        appears differently in the child.  (#g_ProcParams is exempted,
     276 *        LdrInitializeThunk is set to call NtTerminateThread.)
    276277 *      - Unwanted DLLs will be unloaded (we have a set of DLLs we like).
    277278 *
     
    282283 * usually receives handles with unrestricted access to the child process and
    283284 * its main thread.  These could in theory be used with DuplicateHandle or
    284  * WriteProcessMemory to get at the VM process if we're not careful.)
    285  *
    286  * supR3HardenedEarlyProcessInit will continue with opening the log file
     285 * WriteProcessMemory to get at the %VM process if we're not careful.)
     286 *
     287 * #supR3HardenedEarlyProcessInit will continue with opening the log file
    287288 * (requires command line parsing).  It will continue to initialize a bunch of
    288289 * global variables, system calls and trustworthy/harmless NTDLL imports.
    289  * supR3HardenedWinInit is then called to setup image verification, that is:
     290 * #supR3HardenedWinInit is then called to setup image verification, that is:
    290291 *      - Hook the NtCreateSection entry point in NTDLL so we can check all
    291292 *        executable mappings before they're created and can be mapped.  The
    292  *        NtCreateSection code jumps to supR3HardenedMonitor_NtCreateSection.
     293 *        NtCreateSection code jumps to #supR3HardenedMonitor_NtCreateSection.
    293294 *      - Hook (ditto) the LdrLoadDll entry point in NTDLL so we can
    294295 *        pre-validate all images that gets loaded the normal way (partly
     
    296297 *        loader lock is usually held, which prevents us from safely calling
    297298 *        WinVerityTrust).  The LdrLoadDll code jumps to
    298  *        supR3HardenedMonitor_LdrLoadDll.
     299 *        #supR3HardenedMonitor_LdrLoadDll.
    299300 *
    300301 * The image/DLL verification hooks are at this point able to verify DLLs
    301302 * containing embedded code signing signatures, and will restrict the locations
    302  * from which DLLs will be loaded.  When SUPR3HardenedMain gets going later on,
     303 * from which DLLs will be loaded.  When #SUPR3HardenedMain gets going later on,
    303304 * they will start insisting on everything having valid signatures, either
    304305 * embedded or in a signed installer catalog file.
     
    330331 *        than our own two in NTDLL are allowed).
    331332 *
    332  * Once granted access to the stub device, supR3HardenedEarlyProcessInit will
     333 * Once granted access to the stub device, #supR3HardenedEarlyProcessInit will
    333334 * restore the LdrInitializeThunk code and let the process perform normal
    334  * initialization.  Leading us to SUPR3HardenedMain where we detect that this is
    335  * the 2nd stub process and does another respawn.
    336  *
    337  *
    338  * @subsection  sec_hardening_win_3rd_stub  The Final Stub / VM Process
    339  *
    340  * The third stub process is what becomes the VM process.  Because the parent
     335 * initialization.  Leading us to #SUPR3HardenedMain where we detect that this
     336 * is the 2nd stub process and does another respawn.
     337 *
     338 *
     339 * @subsection  sec_hardening_win_3rd_stub  The Final Stub / %VM Process
     340 *
     341 * The third stub process is what becomes the %VM process.  Because the parent
    341342 * has opened \\Device\\VBoxDrvSub, it is protected from malicious OpenProcess &
    342343 * OpenThread calls from the moment of inception, practically speaking.
     
    344345 * It goes thru the same suspended creation, patching, purification and such as
    345346 * its parent (the second stub process).  However, instead of opening
    346  * \\Device\\VBoxDrvStub from supR3HardenedEarlyProcessInit, it opens the
     347 * \\Device\\VBoxDrvStub from #supR3HardenedEarlyProcessInit, it opens the
    347348 * support driver for full unrestricted access, i.e. \\Device\\VBoxDrv.
    348349 *
     
    370371 *
    371372 * As in the second stub process, we'll now do normal process initialization and
    372  * SUPR3HardenedMain will take control.  It will detect that it is being called
     373 * #SUPR3HardenedMain will take control.  It will detect that it is being called
    373374 * by the 3rd stub process because of a different magic string starting the
    374  * command line, and not respawn itself any more.  SUPRR3HardenedMain will
     375 * command line, and not respawn itself any more.  #SUPR3HardenedMain will
    375376 * recheck the VirtualBox installation, keeping all known files open just like
    376377 * in two previous stub processes.
Note: See TracChangeset for help on using the changeset viewer.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette