Skip to content

Commit

Permalink
Merge src README into top-level README
Browse files Browse the repository at this point in the history
  • Loading branch information
r-n-o committed Nov 21, 2024
1 parent 59e2c1b commit 4c9e34c
Show file tree
Hide file tree
Showing 2 changed files with 121 additions and 224 deletions.
208 changes: 121 additions & 87 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,132 +1,166 @@
# QuorumOS #
# QuorumOS

<https://github.com/tkhq/qos>
![License: AGPL v3](https://img.shields.io/badge/License-AGPL%20v3-blue.svg) ![stagex-build Status](https://github.com/tkhq/qos/actions/workflows/stagex.yml/badge.svg) ![stagex-build Status](https://github.com/tkhq/qos/actions/workflows/pr.yml/badge.svg)

Click [here](./src/README.md) for the Rust code README.
## About

## About ##
QuorumOS is a trusted computation layer for hosting enclave apps at modern cloud scale. The OS architecture is based on the principle that a threshold of actors must coordinate to provision a secure compute environment with sensitive application logic and secret material; no single actor can unilaterally provision the environment or secret material.

A minimal, immutable, and deterministic Linux unikernel build system targeting
various Trusted Execution Environments for use cases that require high security
and accountability.
Concretely, QuorumOS is designed to boot in an enclave by attesting to the enclave configuration, reconstructing a Quorum Key and then launching a single enclave app that can leverage the Quorum Key to encrypt and authenticate data.

This is intended as a reference repository which could serve as a boilerplate
to build your own hardened and immutable operating system images for high
security applications.
The consensus on environment configuration is coordinated through the Manifest document which describes, among other things, the enclave image configuration, application CLI arguments, public Quorum Key, and quorum sets. During the bootstrapping process, a threshold of Quorum Members attest to the enclaves configuration against the Manifest out-of-band and then post their respective Quorum Key share. See the [provisioning](#provisioning) section for details.

## Platforms ##
The Quorum Key itself can be used by QuorumOS and enclave apps to encrypt and authenticate data.


QuorumOS ("QOS") is a minimal, immutable, and deterministic Linux unikernel targeting various Trusted Execution Environments for use cases that require high security and accountability.

## Development

### Requirements

- 10GB+ free RAM
- Docker 26+
- GNU Make

### Submitting a PR

Before a PR can be merged our linter and unit tests need to pass.

Run them within [StageX]() (dockerized) with:

```bash
make lint # apply standardized code formatting
make test # run unit tests locally
```

Run them locally (requires a local Rust installation) with:

```sh
make -C src lint
make -C src test
```

All tests must pass.

PRs also need to pass the `build-linux-only` job (part of the `pr` workflow). There are 3 crates excluded from the Rust workspace: `qos_system`, `qos_aws`, and `init`. These crates are excluded because they only build on Linux. If you are not working directly with these crates they generally only need to be updated if the dependencies for `qos_core` change. The linux only crates each have their own lockfile and that will need to be up to date for deterministic builds to work. To update the locks files you will need a linux build environment. Once in a linux build environment you can run `make build-linux-only`, which updates lock files if necessary; any updated lock files should then be committed.

## Platforms

| Platform | Target | Status | Verified boot Method |
|----------------------------|:-------:|:--------:|:---------------------:|
| Generic/Qemu | generic | working | Safeboot or Heads |
| AWS Nitro Enclaves | aws | building | Nitro attestation API |
| AWS Nitro Enclaves | aws | working | Nitro attestation API |
| GCP Confidential Compute | gcp | research | vTPM 2.0 attestation |
| Azure Confidential VMs | azure | research | vTPM 2.0 attestation |

## Features ##
## Components

* Immutability
* Root filesystem is a CPIO filesystem extracted to a RamFS at boot
* Minimalism
* < 5MB footprint
* Nothing is included but a kernel and your target binary by default
* Sample "hello world" included as a default reference
* Debug builds include busybox init shim and drop to a shell
* Determinism
* Multiple people can build artifacts and get identical hashes
* Allows one to prove distributed artifacts correspond to published sources
* Hardening
* No TCP/IP network support
* Favor using a virtual socket or physical interface to a gateway system
* Most unessesary kernel features are disabled at compile time
* Follow [Kernel Self Protection Project](kspp) recommendations
### Enclave

[kspp]: https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
- houses server for listening to the Host
- contains logic for quorum key genesis, booting, and running a Enclave App
- see crate [`qos_core`](./src/qos_core/)

## Trust ##
### Host

The main branch of this repo, which contains all binaries in the dist
directory, should always be signed by multiple people who have confirmed the
source code is what they expect, and results in the expected binaries via
reproducible builds.
- EC2 instance housing the nitro enclave
- has client for talking to nitro enclave
- has server for incoming request from outside world
- see crate [`qos_host`](./src/qos_host/)

We use [git-sig][gs] for this.
#### Client

Please install it in order to follow our signing and verification steps.
- anything making request to host
- see crate [`qos_client`](./src/qos_client/)

Two libraries you may need to `brew install` first are `bash` in order to get to version 5+ and `gnu-getopt`. After
installing `gnu-getopt` in order to get it to be the one that is automatically picked up on the PATH, follow the instructions
provided by `brew` in order to update your PATH.
## Key Terms

### Verify ###
### Quorum Key

#### Signers
An asymmetric key used to uniquely authenticate and encrypt data. This key should only ever be reconstituted inside of an enclave. Additionally, the full provisioning of the Quorum Key concludes the attestation flow, at which point QuorumOS pivots to launching the specified enclave app. At rest, outside of the enclave, the key is intended to be stored across shares using shamir's secret sharing. Note that key shares are always intended to be stored encrypted to the Personal Key, never in plaintext.

Please review that keys are authentic and from individuals you expect.
### Quorum Member

| Name | PGP Fingerprint |
|------------------|------------------------------------------------------------------------------------------|
| Jack Kearney |[CADF 760B CCE7 8999 CEC1 372B 1784 24A6 721E E568](https://keyoxide.org/178424A6721EE568)|
| Lance Vick |[6B61 ECD7 6088 748C 7059 0D55 E90A 4013 36C8 AAA9](https://keyoxide.org/E90A401336C8AAA9)|
| Zeke Mostov |[D96C 422E 04DE 5D2E E0F7 E9E7 DBB0 DCA3 8D40 5491](https://keyoxide.org/DBB0DCA38D405491)|
An entity that is a member of the Manifest Set and holds a share of the Quorum Key.

### Quorum Sets

You can import the keys of all signers with:
There are three types of quorum sets:

```
gpg --import keys/*
```
### Manifest Set

#### Signatures
The collection of members who can approve a manifest. In the typical instance provisioning flow, the Manifest Set will approve the details of the Manifest and then the Share Set members can trust a manifest if it has threshold approvals from the Manifest Set. This creates a logical division of responsibilities between Share Keys and Manifest Keys that enables better key usage practices and organizations to scale parts of the provision flow separately.

Once you have public keys you trust locally pinned, you are able verify that
the artifacts and code we publish are validly signed.
### Share Set

We require a minimum of 2 signatures so you can use [git-sig][gs] as follows:
The collection of members who each hold shares of the Quorum Key and thus provision an enclave by attesting and then posting their shares. When posting shares, these members will also provide a signature of the manifest. The signature is recorded in manifest envelope in order to leave an audit trail. This way, third parties can check which share set members actually participated in provisioning the quorum key

```
git sig verify --threshold 2
```
### Patch Set

### Sign ###
The collection of members who can approve live configuration patches to running enclaves.

We use git-sig for signing the repo and dist artifacts after you have completed
any code review and reproduced your own set of artifacts.
### Manifest Key

```
git sig add
```
A key that is part of the manifest set. This key is used to approve (sign) manifests.

Please make a PR to upload attestation signatures so that this trust can be
preserved for other consumers of these binaries that may lack the resources
to build for themselves.
### Share Key

### Release ###
A key that is part of the Share Set. This is a key that the genesis service encrypts a share too.

Cut a new release to be attested/signed by others.
### Patch Key

```
make VERSION=1.0.0 dist
```
A key that is part of the Patch Set. This is a key that signs live configuration changes.

## Development ##
### Ephemeral Key

### Requirements ###
An asymmetric key that is generated by a QuorumOS instance immediately after boot. Once Quorum Members are able to verify the integrity of a QuorumOS instance, they encrypt their Quorum Key shares to the Ephemeral Key and submit to the instance for reconstruction.

* 10GB+ free RAM
* Docker 20+
* GNU Make
### Manifest

### Examples ###
A file that contains the static configuration to launch an instance of QuorumOS. The composition of the Manifest is attested to in the boot process. All Quorum Members will agree to the Manifest by signing it (QuorumOS should reject a submitted manifest if it has less than threshold signatures.)

#### Build given target
```
make TARGET=generic
```
### Node

#### Boot generic image in Qemu
```
make run
```
A single machine compute instance running QuorumOS.

### Namespace

A group of QuorumOS Nodes running the same Enclave App and using the same Quorum Key. A Namespace contains many live Nodes all with the same Quorum Key and enclave app. Some of these nodes could be using different Manifests and different versions of the same enclave app.

### Pivot / Enclave App

The application QuorumOS pivots to once it finishes booting. This applications binary hash and CLI arguments are specified in the Manifest file.

## Provisioning

Immediately after a valid Manifest is loaded into QuorumOS, the instance will generate an Ephemeral Key. This key is specific to a particular individual machine and, after successfully verifying the machine image and metadata contained in the manifest file, will be used by the Quorum Members to post their shares into the machine.
Prior to posting their share to the machine, Quorum Members use a variety of cryptographic attestations and social coordination to determine if it is appropriate to provision a particular instance of QuorumOS with a given secret.
Upon successful verification of the attestation outputs, each member will encrypt their share to an Ephemeral Key. Once threshold shares have been collected by the instance, it will use Shamir’s Secret Sharing to reconstruct the Quorum Key.

### Remote Attestation

The purpose of remote attestation is to prove that an environment is running a particular piece of software. In the case of AWS Nitro Enclaves, an enclave can uniquely asks the Nitro Security Module (NSM) for an attestation document containing details of the enclave. This document is signed by the Nitro Attestation PKI and is tied back to the AWS Nitro Attestation PKI Root.
As defined in the [AWS documentation](https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html) the instance can request the Nitro Security Module (NSM) to produce an attestation document on its behalf. Additionally, the attestation document contains two fields that can be modified by the enclave itself. The attestation document request contains the Ephemeral Key and the hash of manifest so Share Set members can verify the data is correct.
Before provisioning a namespace with the Quorum Key, a Share Set will use the output of the attestation process against the enclave to verify that the enclave is running the expected version of QuorumOS and that that instance is configured in the expected manner as to warrant being provisioned with that Quorum Key.

Continued reading for attesting with nitro enclaves:

- <https://docs.aws.amazon.com/enclaves/latest/user/set-up-attestation.html>
- <https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html>
- <https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html>

## Enclave Data Flow

Nitro enclaves have a single socket for communicating to their parent EC2 instance. When QuorumOS initially starts up, it starts listening on a [socket server](.src/qos_core/src/server.rs) for [`ProtocolMsg`s](./src/qos_core/src/protocol/msg.rs) (the routing logic for the enclave server is [here](./src/qos_core/src/protocol/mod.rs)) that are sent over a single VSOCK connection with the EC2 instance. The enclave server only supports simple request/response communication with a client on the EC2 instance end of the VSOCK connection.

For communicating just with the QuorumOS enclave server, we have [`qos_host`](./src/qos_host/src/lib.rs), a simple HTTP service that allows for `GET`ing health checks and `POST`ing `ProtocolMsg`s.

We expect that Enclave Apps will have their own host (app host) that will talk to the enclave server over the same socket. A Enclave App is expected to use a simple request/response pattern and arbitrary message serialization. Communication to an app is proxied by the QuorumOS enclave server; so for a app host to communicate with the app it must send a `ProtocolMsg::ProxyRequest { data: Vec<u8> }` to the QuorumOS enclave server, and then the enclave server will send just the `data` to the application over a unix socket. The app will respond to the enclave server with raw data and then the enclave server will respond to the app host with `ProtocolMsg::ProxyResponse { data: Vec<u8> }`.

We expect an EC2 instance to have both a QuorumOS host for booting the enclave and doing health checks and an app host for app specific communication.

Below is a diagram showing the aforementioned app data flow. The diagram mentions gRPC just as an arbitrary example for a protocol that an app caller would use to communicate with the app host.

[gs]: https://codeberg.org/distrust/git-sig
![Enclave App Data Flow Diagram](./src/static/enclave-app-data-flow.png)
[Excalidraw link](https://app.excalidraw.com/s/6bemxcXUAIE/251cQGJS1by)
Loading

0 comments on commit 4c9e34c

Please sign in to comment.