| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452 | .. include:: ../global.rst.inc.. somewhat surprisingly the "bash" highlighter gives nice results with   the pseudo-code notation used in the "Encryption" section... highlight:: bash========Security========.. _borgcrypto:Cryptography in Borg====================.. _attack_model:Attack model------------The attack model of Borg is that the environment of the client process(e.g. ``borg create``) is trusted and the repository (server) is not. Theattacker has any and all access to the repository, including interactivemanipulation (man-in-the-middle) for remote repositories.Furthermore the client environment is assumed to be persistent acrossattacks (practically this means that the security database cannot bedeleted between attacks).Under these circumstances Borg guarantees that the attacker cannot1. modify the data of any archive without the client detecting the change2. rename, remove or add an archive without the client detecting the change3. recover plain-text data4. recover definite (heuristics based on access patterns are possible)   structural information such as the object graph (which archives   refer to what chunks)The attacker can always impose a denial of service per definition (he couldforbid connections to the repository, or delete it entirely)... _security_structural_auth:Structural Authentication-------------------------Borg is fundamentally based on an object graph structure (see :ref:`internals`),where the root object is called the manifest.Borg follows the `Horton principle`_, which states thatnot only the message must be authenticated, but also its meaning (oftenexpressed through context), because every object used is referenced by aparent object through its object ID up to the manifest. The object ID inBorg is a MAC of the object's plaintext, therefore this ensures thatan attacker cannot change the context of an object without forging the MAC.In other words, the object ID itself only authenticates the plaintext of theobject and not its context or meaning. The latter is established by a differentobject referring to an object ID, thereby assigning a particular meaning toan object. For example, an archive item contains a list of object IDs thatrepresent packed file metadata. On their own it's not clear that these objectswould represent what they do, but by the archive item referring to themin a particular part of its own data structure assigns this meaning.This results in a directed acyclic graph of authentication from the manifestto the data chunks of individual files... _tam_description:.. rubric:: Authenticating the manifestSince the manifest has a fixed ID (000...000) the aforementioned authenticationdoes not apply to it, indeed, cannot apply to it; it is impossible to authenticatethe root node of a DAG through its edges, since the root node has no incoming edges.With the scheme as described so far an attacker could easily replace the manifest,therefore Borg includes a tertiary authentication mechanism (TAM) that is appliedto the manifest (see :ref:`tam_vuln`).TAM works by deriving a separate key through HKDF_ from the other encryption andauthentication keys and calculating the HMAC of the metadata to authenticate [#]_::    # RANDOM(n) returns n random bytes    salt = RANDOM(64)    ikm = id_key || crypt_key    # *context* depends on the operation, for manifest authentication it is    # the ASCII string "borg-metadata-authentication-manifest".    tam_key = HKDF-SHA-512(ikm, salt, context)    # *data* is a dict-like structure    data[hmac] = zeroes    packed = pack(data)    data[hmac] = HMAC(tam_key, packed)    packed_authenticated = pack(data)Since an attacker cannot gain access to this key and also cannot make theclient authenticate arbitrary data using this mechanism, the attacker is unableto forge the authentication.This effectively 'anchors' the manifest to the key, which is controlled by theclient, thereby anchoring the entire DAG, making it impossible for an attackerto add, remove or modify any part of the DAG without Borg being able to detectthe tampering.Note that when using BORG_PASSPHRASE the attacker cannot swap the *entire*repository against a new repository with e.g. repokey mode and no passphrase,because Borg will abort access when BORG_PASSPHRASE is incorrect.However, interactively a user might not notice this kind of attackimmediately, if she assumes that the reason for the absent passphraseprompt is a set BORG_PASSPHRASE. See issue :issue:`2169` for details... [#] The reason why the authentication tag is stored in the packed       data itself is that older Borg versions can still read the       manifest this way, while a changed layout would have broken       compatibility... _security_encryption:Encryption----------AEAD modes~~~~~~~~~~Modes: --encryption (repokey|keyfile)-[blake2-](aes-ocb|chacha20-poly1305)Supported: borg 2.0+Encryption with these modes is based on AEAD ciphers (authenticated encryptionwith associated data) and session keys.Depending on the chosen mode (see :ref:`borg_rcreate`) different AEAD ciphers are used:- AES-256-OCB - super fast, single-pass algorithm IF you have hw accelerated AES.- chacha20-poly1305 - very fast, purely software based AEAD cipher.The chunk ID is derived via a MAC over the plaintext (mac key taken from borg key):- HMAC-SHA256 - super fast IF you have hw accelerated SHA256 (see section "Encryption" below).- Blake2b - very fast, purely software based algorithm.For each borg invocation, a new session id is generated by `os.urandom`_.From that session id, the initial key material (ikm, taken from the borg key)and an application and cipher specific salt, borg derives a session key via HKDF.For each session key, IVs (nonces) are generated by a counter which increments foreach encrypted message.Session::    sessionid = os.urandom(24)    ikm = crypt_key    salt = "borg-session-key-CIPHERNAME"    sessionkey = HKDF(ikm, sessionid, salt)    message_iv = 0Encryption::    id = MAC(id_key, data)    compressed = compress(data)    header = type-byte || 00h || message_iv || sessionid    aad = id || header    message_iv++    encrypted, auth_tag = AEAD_encrypt(session_key, message_iv, compressed, aad)    authenticated = header || auth_tag || encryptedDecryption::    # Given: input *authenticated* data and a *chunk-id* to assert    type-byte, past_message_iv, past_sessionid, auth_tag, encrypted = SPLIT(authenticated)    ASSERT(type-byte is correct)    past_key = HKDF(ikm, past_sessionid, salt)    decrypted = AEAD_decrypt(past_key, past_message_iv, authenticated)    decompressed = decompress(decrypted)Notable:- More modern and often faster AEAD ciphers instead of self-assembled stuff.- Due to the usage of session keys, IVs (nonces) do not need special care here as  they did for the legacy encryption modes.- The id is now also input into the authentication tag computation.  This strongly associates the id with the written data (== associates the key with  the value). When later reading the data for some id, authentication will only  succeed if what we get was really written by us for that id.Legacy modes~~~~~~~~~~~~Modes: --encryption (repokey|keyfile)-[blake2]Supported: borg < 2.0These were the AES-CTR based modes in previous borg versions.borg 2.0 does not support creating new repos using these modes,but ``borg transfer`` can still read such existing repos... _key_encryption:Offline key security--------------------Borg cannot secure the key material while it is running, because the keysare needed in plain to decrypt/encrypt repository objects.For offline storage of the encryption keys they are encrypted with auser-chosen passphrase.A 256 bit key encryption key (KEK) is derived from the passphraseusing argon2_ with a random 256 bit salt. The KEK is then usedto Encrypt-*then*-MAC a packed representation of the keys using thechacha20-poly1305 AEAD cipher and a constant IV == 0.The ciphertext is then converted to base64.This base64 blob (commonly referred to as *keyblob*) is then stored inthe key file or in the repository config (keyfile and repokey modesrespectively).The use of a constant IV is secure because an identical passphrase willresult in a different derived KEK for every key encryption due to the salt... seealso::   Refer to the :ref:`key_files` section for details on the format.Implementations used--------------------We do not implement cryptographic primitives ourselves, but relyon widely used libraries providing them:- AES-OCB and CHACHA20-POLY1305 from OpenSSL 1.1 are used,  which is also linked into the static binaries we provide.  We think this is not an additional risk, since we don't ever  use OpenSSL's networking, TLS or X.509 code, but only their  primitives implemented in libcrypto.- SHA-256, SHA-512 and BLAKE2b from Python's hashlib_ standard library module are used.- HMAC and a constant-time comparison from Python's hmac_ standard library module are used.- argon2 is used via argon2-cffi.Implemented cryptographic constructions are:- HKDF_-SHA-512 (using ``hmac.digest`` from Python's hmac_ standard library module).. _Horton principle: https://en.wikipedia.org/wiki/Horton_Principle.. _HKDF: https://tools.ietf.org/html/rfc5869.. _length extension: https://en.wikipedia.org/wiki/Length_extension_attack.. _hashlib: https://docs.python.org/3/library/hashlib.html.. _hmac: https://docs.python.org/3/library/hmac.html.. _os.urandom: https://docs.python.org/3/library/os.html#os.urandomRemote RPC protocol security============================.. note:: This section could be further expanded / detailed.The RPC protocol is fundamentally based on msgpack'd messages exchangedover an encrypted SSH channel (the system's SSH client is used for thisby piping data from/to it).This means that the authorization and transport security propertiesare inherited from SSH and the configuration of the SSH client and theSSH server -- Borg RPC does not contain *any* networkingcode. Networking is done by the SSH client running in a separateprocess, Borg only communicates over the standard pipes (stdout,stderr and stdin) with this process. This also means that Borg doesn'thave to directly use a SSH client (or SSH at all). For example,``sudo`` or ``qrexec`` could be used as an intermediary.By using the system's SSH client and not implementing a(cryptographic) network protocol Borg sidesteps many security issuesthat would normally impact distributing statically linked / standalonebinaries.The remainder of this section will focus on the security of the RPCprotocol within Borg.The assumed worst-case a server can inflict to a client is adenial of repository service.The situation where a server can create a general DoS on the clientshould be avoided, but might be possible by e.g. forcing the client toallocate large amounts of memory to decode large messages (or messagesthat merely indicate a large amount of data follows). The RPC protocolcode uses a limited msgpack Unpacker to prohibit this.We believe that other kinds of attacks, especially critical vulnerabilitieslike remote code execution are inhibited by the design of the protocol:1. The server cannot send requests to the client on its own accord,   it only can send responses. This avoids "unexpected inversion of control"   issues.2. msgpack serialization does not allow embedding or referencing code that   is automatically executed. Incoming messages are unpacked by the msgpack   unpacker into native Python data structures (like tuples and dictionaries),   which are then passed to the rest of the program.   Additional verification of the correct form of the responses could be implemented.3. Remote errors are presented in two forms:   1. A simple plain-text *stderr* channel. A prefix string indicates the kind of message      (e.g. WARNING, INFO, ERROR), which is used to suppress it according to the      log level selected in the client.      A server can send arbitrary log messages, which may confuse a user. However,      log messages are only processed when server requests are in progress, therefore      the server cannot interfere / confuse with security critical dialogue like      the password prompt.   2. Server-side exceptions passed over the main data channel. These follow the      general pattern of server-sent responses and are sent instead of response data      for a request.The msgpack implementation used (msgpack-python) has a good security track record,a large test suite and no issues found by fuzzing. It is based on the msgpack-c implementation,sharing the unpacking engine and some support code. msgpack-c has a good track record as well.Some issues [#]_ in the past were located in code not included in msgpack-python.Borg does not use msgpack-c... [#] - `MessagePack fuzzing <https://blog.gypsyengineer.com/fun/msgpack-fuzzing.html>`_       - `Fixed integer overflow and EXT size problem <https://github.com/msgpack/msgpack-c/pull/547>`_       - `Fixed array and map size overflow <https://github.com/msgpack/msgpack-c/pull/550>`_Using OpenSSL=============Borg uses the OpenSSL library for most cryptography (see `Implementations used`_ above).OpenSSL is bundled with static releases, thus the bundled copy is not updated with systemupdates.OpenSSL is a large and complex piece of software and has had its share of vulnerabilities,however, it is important to note that Borg links against ``libcrypto`` **not** ``libssl``.libcrypto is the low-level cryptography part of OpenSSL,while libssl implements TLS and related protocols.The latter is not used by Borg (cf. `Remote RPC protocol security`_, Borg itself does not implementany network access) and historically contained most vulnerabilities, especially critical ones.The static binaries released by the project contain neither libssl nor the Python ssl/_ssl modules.Compression and Encryption==========================Combining encryption with compression can be insecure in some contexts (e.g. online protocols).There was some discussion about this in :issue:`1040` and for Borg some developersconcluded this is no problem at all, some concluded this is hard and extremely slow to exploitand thus no problem in practice.No matter what, there is always the option not to use compression if you are worried about this.Fingerprinting==============Stored chunk sizes------------------A borg repository does not hide the size of the chunks it stores (sizeinformation is needed to operate the repository).The chunks stored in the repo are the (compressed, encrypted and authenticated)output of the chunker. The sizes of these stored chunks are influenced by thecompression, encryption and authentication.buzhash chunker~~~~~~~~~~~~~~~The buzhash chunker chunks according to the input data, the chunker'sparameters and the secret chunker seed (which all influence the chunk boundarypositions).Small files below some specific threshold (default: 512 KiB) result in only onechunk (identical content / size as the original file), bigger files result inmultiple chunks.fixed chunker~~~~~~~~~~~~~This chunker yields fixed sized chunks, with optional support of a differentlysized header chunk. The last chunk is not required to have the full block sizeand is determined by the input file size.Within our attack model, an attacker possessing a specific set of files whichhe assumes that the victim also possesses (and backups into the repository)could try a brute force fingerprinting attack based on the chunk sizes in therepository to prove his assumption.To make this more difficult, borg has an ``obfuscate`` pseudo compressor, thatwill take the output of the normal compression step and tries to obfuscatethe size of that output. Of course, it can only **add** to the size, not reduceit. Thus, the optional usage of this mechanism comes at a cost: it will makeyour repository larger (ranging from a few percent larger [cheap] to ridiculouslylarger [expensive], depending on the algorithm/params you wisely choose).The output of the compressed-size obfuscation step will then be encrypted andauthenticated, as usual. Of course, using that obfuscation would not make anysense without encryption. Thus, the additional data added by the obfuscatorare just 0x00 bytes, which is good enough because after encryption it willlook like random anyway.To summarize, this is making size-based fingerprinting difficult:- user-selectable chunker algorithm (and parametrization)- for the buzhash chunker: secret, random per-repo chunker seed- user-selectable compression algorithm (and level)- optional ``obfuscate`` pseudo compressor with different choices  of algorithm and parametersSecret key usage against fingerprinting---------------------------------------Borg uses the borg key also for chunking and chunk ID generation to protect against fingerprinting.As usual for borg's attack model, the attacker is assumed to have access to a borg repository.The borg key includes a secret random chunk_seed which (together with the chunking algorithm)determines the cutting places and thereby the length of the chunks cut. Because the attacker tryinga chunk length fingerprinting attack would use a different chunker secret than the borg setup beingattacked, they would not be able to determine the set of chunk lengths for a known set of files.The borg key also includes a secret random id_key. The chunk ID generation is not just using a simplecryptographic hash like sha256 (because that would be insecure as an attacker could see the hashes ofsmall files that result only in 1 chunk in the repository). Instead, borg uses keyed hash (a MAC,e.g. HMAC-SHA256) to compute the chunk ID from the content and the secret id_key. Thus, an attackercan't compute the same chunk IDs for a known set of small files to determine whether these are storedin the attacked repository.Stored chunk proximity----------------------Borg does not try to obfuscate order / proximity of files it discovers byrecursing through the filesystem. For performance reasons, we sort directorycontents in file inode order (not in file name alphabetical order), so orderfingerprinting is not useful for an attacker.But, when new files are close to each other (when looking at recursion /scanning order), the resulting chunks will be also stored close to each otherin the resulting repository segment file(s).This might leak additional information for the chunk size fingerprintingattack (see above).
 |