1923e9311SThomas Huth.. _VNC security: 2324b2298SPaolo Bonzini 3324b2298SPaolo BonziniVNC security 4324b2298SPaolo Bonzini------------ 5324b2298SPaolo Bonzini 6324b2298SPaolo BonziniThe VNC server capability provides access to the graphical console of 7324b2298SPaolo Bonzinithe guest VM across the network. This has a number of security 8324b2298SPaolo Bonziniconsiderations depending on the deployment scenarios. 9324b2298SPaolo Bonzini 10324b2298SPaolo Bonzini.. _vnc_005fsec_005fnone: 11324b2298SPaolo Bonzini 12324b2298SPaolo BonziniWithout passwords 13324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~ 14324b2298SPaolo Bonzini 15324b2298SPaolo BonziniThe simplest VNC server setup does not include any form of 16324b2298SPaolo Bonziniauthentication. For this setup it is recommended to restrict it to 17324b2298SPaolo Bonzinilisten on a UNIX domain socket only. For example 18324b2298SPaolo Bonzini 19324b2298SPaolo Bonzini.. parsed-literal:: 20324b2298SPaolo Bonzini 21324b2298SPaolo Bonzini |qemu_system| [...OPTIONS...] -vnc unix:/home/joebloggs/.qemu-myvm-vnc 22324b2298SPaolo Bonzini 23324b2298SPaolo BonziniThis ensures that only users on local box with read/write access to that 24324b2298SPaolo Bonzinipath can access the VNC server. To securely access the VNC server from a 25324b2298SPaolo Bonziniremote machine, a combination of netcat+ssh can be used to provide a 26324b2298SPaolo Bonzinisecure tunnel. 27324b2298SPaolo Bonzini 28324b2298SPaolo Bonzini.. _vnc_005fsec_005fpassword: 29324b2298SPaolo Bonzini 30324b2298SPaolo BonziniWith passwords 31324b2298SPaolo Bonzini~~~~~~~~~~~~~~ 32324b2298SPaolo Bonzini 33324b2298SPaolo BonziniThe VNC protocol has limited support for password based authentication. 34324b2298SPaolo BonziniSince the protocol limits passwords to 8 characters it should not be 35324b2298SPaolo Bonziniconsidered to provide high security. The password can be fairly easily 36324b2298SPaolo Bonzinibrute-forced by a client making repeat connections. For this reason, a 37324b2298SPaolo BonziniVNC server using password authentication should be restricted to only 38324b2298SPaolo Bonzinilisten on the loopback interface or UNIX domain sockets. Password 39324b2298SPaolo Bonziniauthentication is not supported when operating in FIPS 140-2 compliance 40324b2298SPaolo Bonzinimode as it requires the use of the DES cipher. Password authentication 41324b2298SPaolo Bonziniis requested with the ``password`` option, and then once QEMU is running 42324b2298SPaolo Bonzinithe password is set with the monitor. Until the monitor is used to set 43324b2298SPaolo Bonzinithe password all clients will be rejected. 44324b2298SPaolo Bonzini 45324b2298SPaolo Bonzini.. parsed-literal:: 46324b2298SPaolo Bonzini 47f3f8ce67SDaniel P. Berrangé |qemu_system| [...OPTIONS...] -vnc :1,password=on -monitor stdio 48324b2298SPaolo Bonzini (qemu) change vnc password 49324b2298SPaolo Bonzini Password: ******** 50324b2298SPaolo Bonzini (qemu) 51324b2298SPaolo Bonzini 52324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate: 53324b2298SPaolo Bonzini 54324b2298SPaolo BonziniWith x509 certificates 55324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~ 56324b2298SPaolo Bonzini 57324b2298SPaolo BonziniThe QEMU VNC server also implements the VeNCrypt extension allowing use 58324b2298SPaolo Bonziniof TLS for encryption of the session, and x509 certificates for 59324b2298SPaolo Bonziniauthentication. The use of x509 certificates is strongly recommended, 60324b2298SPaolo Bonzinibecause TLS on its own is susceptible to man-in-the-middle attacks. 61324b2298SPaolo BonziniBasic x509 certificate support provides a secure session, but no 62324b2298SPaolo Bonziniauthentication. This allows any client to connect, and provides an 63324b2298SPaolo Bonziniencrypted session. 64324b2298SPaolo Bonzini 65324b2298SPaolo Bonzini.. parsed-literal:: 66324b2298SPaolo Bonzini 67324b2298SPaolo Bonzini |qemu_system| [...OPTIONS...] \ 684d7beeabSDaniel P. Berrangé -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=off \ 69324b2298SPaolo Bonzini -vnc :1,tls-creds=tls0 -monitor stdio 70324b2298SPaolo Bonzini 71324b2298SPaolo BonziniIn the above example ``/etc/pki/qemu`` should contain at least three 72324b2298SPaolo Bonzinifiles, ``ca-cert.pem``, ``server-cert.pem`` and ``server-key.pem``. 73324b2298SPaolo BonziniUnprivileged users will want to use a private directory, for example 74324b2298SPaolo Bonzini``$HOME/.pki/qemu``. NB the ``server-key.pem`` file should be protected 75324b2298SPaolo Bonziniwith file mode 0600 to only be readable by the user owning it. 76324b2298SPaolo Bonzini 77324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate_005fverify: 78324b2298SPaolo Bonzini 79324b2298SPaolo BonziniWith x509 certificates and client verification 80324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 81324b2298SPaolo Bonzini 82324b2298SPaolo BonziniCertificates can also provide a means to authenticate the client 83324b2298SPaolo Bonziniconnecting. The server will request that the client provide a 84324b2298SPaolo Bonzinicertificate, which it will then validate against the CA certificate. 85324b2298SPaolo BonziniThis is a good choice if deploying in an environment with a private 86324b2298SPaolo Bonziniinternal certificate authority. It uses the same syntax as previously, 874d7beeabSDaniel P. Berrangébut with ``verify-peer`` set to ``on`` instead. 88324b2298SPaolo Bonzini 89324b2298SPaolo Bonzini.. parsed-literal:: 90324b2298SPaolo Bonzini 91324b2298SPaolo Bonzini |qemu_system| [...OPTIONS...] \ 924d7beeabSDaniel P. Berrangé -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=on \ 93324b2298SPaolo Bonzini -vnc :1,tls-creds=tls0 -monitor stdio 94324b2298SPaolo Bonzini 95324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate_005fpw: 96324b2298SPaolo Bonzini 97324b2298SPaolo BonziniWith x509 certificates, client verification and passwords 98324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 99324b2298SPaolo Bonzini 100324b2298SPaolo BonziniFinally, the previous method can be combined with VNC password 101324b2298SPaolo Bonziniauthentication to provide two layers of authentication for clients. 102324b2298SPaolo Bonzini 103324b2298SPaolo Bonzini.. parsed-literal:: 104324b2298SPaolo Bonzini 105324b2298SPaolo Bonzini |qemu_system| [...OPTIONS...] \ 1064d7beeabSDaniel P. Berrangé -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=on \ 107f3f8ce67SDaniel P. Berrangé -vnc :1,tls-creds=tls0,password=on -monitor stdio 108324b2298SPaolo Bonzini (qemu) change vnc password 109324b2298SPaolo Bonzini Password: ******** 110324b2298SPaolo Bonzini (qemu) 111324b2298SPaolo Bonzini 112324b2298SPaolo Bonzini.. _vnc_005fsec_005fsasl: 113324b2298SPaolo Bonzini 114324b2298SPaolo BonziniWith SASL authentication 115324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~ 116324b2298SPaolo Bonzini 117324b2298SPaolo BonziniThe SASL authentication method is a VNC extension, that provides an 118324b2298SPaolo Bonzinieasily extendable, pluggable authentication method. This allows for 119324b2298SPaolo Bonziniintegration with a wide range of authentication mechanisms, such as PAM, 120324b2298SPaolo BonziniGSSAPI/Kerberos, LDAP, SQL databases, one-time keys and more. The 121324b2298SPaolo Bonzinistrength of the authentication depends on the exact mechanism 122324b2298SPaolo Bonziniconfigured. If the chosen mechanism also provides a SSF layer, then it 123324b2298SPaolo Bonziniwill encrypt the datastream as well. 124324b2298SPaolo Bonzini 125324b2298SPaolo BonziniRefer to the later docs on how to choose the exact SASL mechanism used 126324b2298SPaolo Bonzinifor authentication, but assuming use of one supporting SSF, then QEMU 127324b2298SPaolo Bonzinican be launched with: 128324b2298SPaolo Bonzini 129324b2298SPaolo Bonzini.. parsed-literal:: 130324b2298SPaolo Bonzini 131f3f8ce67SDaniel P. Berrangé |qemu_system| [...OPTIONS...] -vnc :1,sasl=on -monitor stdio 132324b2298SPaolo Bonzini 133324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate_005fsasl: 134324b2298SPaolo Bonzini 135324b2298SPaolo BonziniWith x509 certificates and SASL authentication 136324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 137324b2298SPaolo Bonzini 138324b2298SPaolo BonziniIf the desired SASL authentication mechanism does not supported SSF 139324b2298SPaolo Bonzinilayers, then it is strongly advised to run it in combination with TLS 140324b2298SPaolo Bonziniand x509 certificates. This provides securely encrypted data stream, 141324b2298SPaolo Bonziniavoiding risk of compromising of the security credentials. This can be 142324b2298SPaolo Bonzinienabled, by combining the 'sasl' option with the aforementioned TLS + 143324b2298SPaolo Bonzinix509 options: 144324b2298SPaolo Bonzini 145324b2298SPaolo Bonzini.. parsed-literal:: 146324b2298SPaolo Bonzini 147324b2298SPaolo Bonzini |qemu_system| [...OPTIONS...] \ 1484d7beeabSDaniel P. Berrangé -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=on \ 149f3f8ce67SDaniel P. Berrangé -vnc :1,tls-creds=tls0,sasl=on -monitor stdio 150324b2298SPaolo Bonzini 151324b2298SPaolo Bonzini.. _vnc_005fsetup_005fsasl: 152324b2298SPaolo Bonzini 153324b2298SPaolo BonziniConfiguring SASL mechanisms 154324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~ 155324b2298SPaolo Bonzini 156324b2298SPaolo BonziniThe following documentation assumes use of the Cyrus SASL implementation 157324b2298SPaolo Bonzinion a Linux host, but the principles should apply to any other SASL 158324b2298SPaolo Bonziniimplementation or host. When SASL is enabled, the mechanism 159324b2298SPaolo Bonziniconfiguration will be loaded from system default SASL service config 160324b2298SPaolo Bonzini/etc/sasl2/qemu.conf. If running QEMU as an unprivileged user, an 161324b2298SPaolo Bonzinienvironment variable SASL_CONF_PATH can be used to make it search 162324b2298SPaolo Bonzinialternate locations for the service config file. 163324b2298SPaolo Bonzini 164324b2298SPaolo BonziniIf the TLS option is enabled for VNC, then it will provide session 165324b2298SPaolo Bonziniencryption, otherwise the SASL mechanism will have to provide 166324b2298SPaolo Bonziniencryption. In the latter case the list of possible plugins that can be 167324b2298SPaolo Bonziniused is drastically reduced. In fact only the GSSAPI SASL mechanism 168324b2298SPaolo Bonziniprovides an acceptable level of security by modern standards. Previous 169324b2298SPaolo Bonziniversions of QEMU referred to the DIGEST-MD5 mechanism, however, it has 170324b2298SPaolo Bonzinimultiple serious flaws described in detail in RFC 6331 and thus should 171*e2bf32dfSDaniel P. Berrangénever be used any more. The SCRAM-SHA-256 mechanism provides a simple 172324b2298SPaolo Bonziniusername/password auth facility similar to DIGEST-MD5, but does not 173324b2298SPaolo Bonzinisupport session encryption, so can only be used in combination with TLS. 174324b2298SPaolo Bonzini 175324b2298SPaolo BonziniWhen not using TLS the recommended configuration is 176324b2298SPaolo Bonzini 177324b2298SPaolo Bonzini:: 178324b2298SPaolo Bonzini 179324b2298SPaolo Bonzini mech_list: gssapi 180324b2298SPaolo Bonzini keytab: /etc/qemu/krb5.tab 181324b2298SPaolo Bonzini 182324b2298SPaolo BonziniThis says to use the 'GSSAPI' mechanism with the Kerberos v5 protocol, 183324b2298SPaolo Bonziniwith the server principal stored in /etc/qemu/krb5.tab. For this to work 184324b2298SPaolo Bonzinithe administrator of your KDC must generate a Kerberos principal for the 185324b2298SPaolo Bonziniserver, with a name of 'qemu/somehost.example.com@EXAMPLE.COM' replacing 186324b2298SPaolo Bonzini'somehost.example.com' with the fully qualified host name of the machine 187324b2298SPaolo Bonzinirunning QEMU, and 'EXAMPLE.COM' with the Kerberos Realm. 188324b2298SPaolo Bonzini 189324b2298SPaolo BonziniWhen using TLS, if username+password authentication is desired, then a 190324b2298SPaolo Bonzinireasonable configuration is 191324b2298SPaolo Bonzini 192324b2298SPaolo Bonzini:: 193324b2298SPaolo Bonzini 194*e2bf32dfSDaniel P. Berrangé mech_list: scram-sha-256 195324b2298SPaolo Bonzini sasldb_path: /etc/qemu/passwd.db 196324b2298SPaolo Bonzini 197324b2298SPaolo BonziniThe ``saslpasswd2`` program can be used to populate the ``passwd.db`` 198*e2bf32dfSDaniel P. Berrangéfile with accounts. Note that the ``passwd.db`` file stores passwords 199*e2bf32dfSDaniel P. Berrangéin clear text. 200324b2298SPaolo Bonzini 201324b2298SPaolo BonziniOther SASL configurations will be left as an exercise for the reader. 202324b2298SPaolo BonziniNote that all mechanisms, except GSSAPI, should be combined with use of 203324b2298SPaolo BonziniTLS to ensure a secure data channel. 204