You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 43 Next »

Code signing was introduced in Java to provide a mechanism for granting elevated privileges to code irrespective of the security policy in effect. For example, Java applets that need to read system properties from a user's machine can escape the default sandbox restrictions when signed. When a signed applet is run, the user is prompted with a security dialog, asking whether the party that signed the code is considered trustworthy. This element of trusting the signature and the signer allows applets to escape the default security sandbox restrictions. On the other hand, with applications that use a custom security policy, explicit permissions need to be granted to the particular codebase and optionally, the signer. Both these approaches place the control in the hands of the user who can choose to run the application either restrictively or with full permissions.

Signing code, however, has its own problems. According to Schneier [[Schneier 00]]:

First, users have no idea how to decide if a particular signer is trusted or not. Second, just because a component is signed doesn't mean that it is safe. Third, just because two components are individually signed does not mean that using them together is safe; lots of accidental harmful interactions can be exploited. Fourth, "safe" is not an all-or-nothing thing; there are degrees of safety. And fifth, the fact that the evidence of attack (the signature on the code) is stored on the computer under attack is mostly useless: The attacker could delete or modify the signature during the attack, or simply reformat the drive where the signature is stored."

Code signing is designed primarily to verify authenticity of origin and integrity of the code. It relies on a Certification Authority (CA) to duly confirm the identity of the principal signer. Naive users should not be expected to understand how certificates and the Public Key Infrastructure (PKI) work. All too often, users associate digital signatures with safety of code execution, and trust the code to cause them no harm.

In general, there is a misconception that signed code is safe to be executed. The problem manifests itself when a vulnerability is discovered in signed code. Because many users when prompted with the security dialog, choose the option of permanently trusting the organizations that they consider trustworthy, they are not notified in the future while downloading trusted but potentially vulnerable content signed by the trusted organization. An adversary may offer them the vulnerable content with the intentions of exploiting it. Consider, for example, signed Java applets. Whenever a certificate is verified to be correct (as opposed to being self-signed or tampered), on widely used platforms the user is confronted with a security dialog that has the check box option "Always trust the content from the publisher" selected by default. The dialog asks whether the signed code should be executed or not. Unfortunately, by default this setting overrides any future warning dialogs if the user chooses to execute the code with the check box selected. An adversary may take advantage of this mechanism by supplying vulnerable code signed by the trusted organization. In this case, the code will execute without the user's permission and may be freely exploited.

An organization that signs its code must not vouch for code acquired from a third party without carefully auditing it. When signing privileged code, ensure that the code is confined to the same package (ENV01-J. Place all privileged code in a single package and seal the package). Likewise, any code that is called from the privileged code must also be bundled in the same package. Non-privileged code can be left unsigned, restricting it to the sandbox. Additionally, any code that is incomprehensible or unaudited must not be signed (SEC32-J. Create and sign a SignedObject before creating a SealedObject).

It follows that unprivileged code is not required to be digitally signed and consequently should not be. This conviction adequately respects the guideline SEC00-J. Follow the principle of least privilege. For instance, unsigned applets and JNLP applications are granted the minimum set of privileges and are restricted to the sandbox.

Exceptions

EX1: An organization that has an internal PKI and uses code signing for internal development activities (such as to facilitate code-check-in and track developers) may sign unprivileged code. This codebase should not be carried forward to the production environment. The keys used for signing must not be used to ship the products.

Risk Assessment

Signing unprivileged code violates the principle of least privilege as it can circumvent security restrictions defined by the security policies of applets and Java Network Launch Protocol (JNLP) applications, for example.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

ENV00- J

high

probable

medium

P12

L1

Automated Detection

TODO

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

References

[[Schneier 00]]
[[McGraw 00]] Appendix C: Sign Only Privileged Code
[[Dormann 08]]


01. Runtime Environment (ENV)      01. Runtime Environment (ENV)      ENV07-J. Do not deploy an application that can be accessed by the JVM Tool Interface

  • No labels