A configuration management framework for cryptography using system-wide profiles that are switched atomically. It is gradually being rolled out in Ubuntu.
This repository contains the framework. Profile data is to be stored directly inside each package. As an exception during early days, this repository may also contain profile data in order to avoid a chicken-and-egg situation.
- Example
- Usecases
- Sources of the configuration with
crypto-config
- What profiles are
- Usage of /usr/bin/crypto-config
- Implementation and porting
- Specification
- Bug reports
- License
Consider two profiles: default
and future
. The future
one disables
TLS < 1.3 and RSA < 4096.
Configure an nginx
server with TLS and use sslscan
to check its
configuration; the output will contain the following:
# sslscan 127.0.0.1
...
TLSv1.2 enabled
TLSv1.3 enabled
Switch to the future
profile from `crypto-config:
crypto-config switch future
Restart nginx
and use sslscan
again.
systemctl restart nginx
sslscan 127.0.0.1
...
TLSv1.2 disabled
TLSv1.3 enabled
A few lines of cloud-config
configuration are enough to install crypto-config
and select a profile. Considering a file named user-data.yaml
which contains
the following:
#cloud-config
packages:
- crypto-config
runcmd:
- crypto-config switch future
Create an LXD profile, include the file above and use the profile to start a container using Ubuntu plucky:
lxc profile create crypto-config
lxc profile set crypto-config user.user-data - < user-data.yaml
lxc launch ubuntu-daily:plucky cc-test -p default -p crypto-config
This is used to make a demo which is stored under docs/lxd-cloud-config
.
Distributions need to find the balance between compatibility and security. Some legacy systems do not understand newer protocols and algorithms. Crypto-config profiles can be made for hardening or compliance purposes. In addition, it is possible to derive customized profiles for these in order to re-enable a given algorithm if needed (for instance because you still need to keep compatibility with that old box you can't get rid of).
Since crypto-config
profiles use inheritance and are stored in unified
locations, customisations are easier to spot and maintain over extended periods
of time.
System administrators for large networks will probably appreciate the ability to create unified configuration for all machines.
Since these stocks are most likely heterogeneous and cannot be all upgraded at once, it can be useful to design a profile and do a progressive roll-out across machines. Moreover, profiles with modern configuration options can be customised to keep some legacy algorithms enabled until not needed anymore.
After release, Ubuntu versions strive to preserve compatibility. This typically means not disabling a cryptographic algorithm as that would prevent data exchange in some situations. This can be at odds with security when an algorithm is found to be broken or almost broken.
A proposal for Ubuntu is to keep the default
profile unchanged over time. The
experience of most users would therefore be unchanged. However, other profiles
may be updated. As such, profiles such as modern
could be updated over time
to avoid actually becoming a legacy
profile after a few years.
In addition, changes to the profiles could be staged in dedicated profiles such
as modern-incoming
. Having too many profiles would be detrimental but
incoming variants would carry differences only for maybe six months or so.
There are two ways a program such as nginx
is configured in practice. The
paths below refer to the files used with crypto-config
specifically.
First, through its own configuration:
nginx
⬇️
/etc/nginx/nginx.conf
⬇️
/etc/nginx/conf.d/crypto-config.conf
⬇️
/var/lib/crypto-config/profiles/current/nginx.conf.d/*.conf
⬇️
/var/lib/crypto-config/profiles/current/nginx.conf.d/ssl.conf
But some of its features are also impacted by the configuration of its dependencies:
nginx
⬇️
/etc/ssl/openssl.cnf
⬇️
/var/lib/crypto-config/profiles/current/openssl.conf.d
⬇️
/var/lib/crypto-config/profiles/current/openssl.conf.d/seclevel.cnf
Crypto-config profiles are made of drop-in files and configuration fragments. You can think of a profile as a subset of configuration files on your system, and choosing a profile as atomically switching these to alternative ones.
Distributions should come up with a list of profiles and the intent for each of
them. Typical examples include default
, legacy
and future
:
default
would match what is already being done at the moment,legacy
tweaksdefault
to increase compatibility with legacy systems,future
tweaksdefault
to increase security and uses settings that are expected to become the default ones in the future.
The core goal is to have various software configured in a consistent and meaningful way. For instance, a profile that disables a protocol for openssl should disable it for gnutls too. However, it is also understandable that an algorithm is disabled for HTTPS servers but enabled for SMTP ones because they live in two different ecosystems.
The crypto-config binary currently accepts three commands: get
, status
and
switch <profile>
'.
Return the profile currently in use.
Show the profile currently in use. May show more in the future. This is meant for interactive use rather than for scripting.
Use this profile.
The profiles are stored in /var/lib/crypto-config/profiles
.
In this directory there is also a symlink called current
which points to the
chosen profile. The profile switch is the atomic change of the symlink target.
It is possible to skip the configuration for some software when creating a profile: it will be inherited from the profile's parent through an inheritance mechanism.
Packages install profile data under /usr/share/crypto-config/profiles/
.
After installation, a short (and idempotent) program fills in the skipped data
using based on the inheritance relationship. The result is then stored in
/var/lib/crypto-config/profiles
and is ready to be used by software.
There are dozens, if not hundreds, of different configuration systems. There is
therefore no single way to make software read part of its configuration from
crypto-config
: it depends on each software.
Luckily, nowadays many pieces of software handle include
-style directives and
drop-ins.
As an example, for openssl, the following has been added at the end of
/etc/ssl/openssl.cnf
:
.include /var/lib/crypto-config/profiles/current/openssl.conf.d
Of course, this will only have an actual effect when there is something in that directory.
It's more convenient to not fail when the target directory or file does not
exist. For instance, enabling crypto-config
for nginx uses
/etc/nginx/conf.d/crypto-config.conf
which contains the following:
include /var/lib/crypto-config/profiles/current/nginx.conf.d/*.conf;
Nginx refuses to start if it is instructed to include
a non-existing file for
its configuration. However, if there is a wildcard in the path, it accepts that
there is no matching file.
These small changes to configuration are to be done by package maintainers and as they should make the best judgement. Similarly, packagers provide configuration snippets for the various profiles that it makes sense for them to support directly.
The full specification lives on discourse.ubuntu.com and is also copied in this repository.
Please file bug reports in Launchpad.
Crypto-config is licensed under the GPLv3.