xref: /openbmc/qemu/docs/system/vnc-security.rst (revision 1ea06abceec61b6f3ab33dadb0510b6e09fb61e2)
1923e9311SThomas Huth.. _VNC security:
2324b2298SPaolo Bonzini
3324b2298SPaolo BonziniVNC security
4324b2298SPaolo Bonzini------------
5324b2298SPaolo Bonzini
6324b2298SPaolo BonziniThe VNC server capability provides access to the graphical console of
7324b2298SPaolo Bonzinithe guest VM across the network. This has a number of security
8324b2298SPaolo Bonziniconsiderations depending on the deployment scenarios.
9324b2298SPaolo Bonzini
10324b2298SPaolo Bonzini.. _vnc_005fsec_005fnone:
11324b2298SPaolo Bonzini
12324b2298SPaolo BonziniWithout passwords
13324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~
14324b2298SPaolo Bonzini
15324b2298SPaolo BonziniThe simplest VNC server setup does not include any form of
16324b2298SPaolo Bonziniauthentication. For this setup it is recommended to restrict it to
17324b2298SPaolo Bonzinilisten on a UNIX domain socket only. For example
18324b2298SPaolo Bonzini
19324b2298SPaolo Bonzini.. parsed-literal::
20324b2298SPaolo Bonzini
21324b2298SPaolo Bonzini   |qemu_system| [...OPTIONS...] -vnc unix:/home/joebloggs/.qemu-myvm-vnc
22324b2298SPaolo Bonzini
23324b2298SPaolo BonziniThis ensures that only users on local box with read/write access to that
24324b2298SPaolo Bonzinipath can access the VNC server. To securely access the VNC server from a
25324b2298SPaolo Bonziniremote machine, a combination of netcat+ssh can be used to provide a
26324b2298SPaolo Bonzinisecure tunnel.
27324b2298SPaolo Bonzini
28324b2298SPaolo Bonzini.. _vnc_005fsec_005fpassword:
29324b2298SPaolo Bonzini
30324b2298SPaolo BonziniWith passwords
31324b2298SPaolo Bonzini~~~~~~~~~~~~~~
32324b2298SPaolo Bonzini
33324b2298SPaolo BonziniThe VNC protocol has limited support for password based authentication.
34324b2298SPaolo BonziniSince the protocol limits passwords to 8 characters it should not be
35324b2298SPaolo Bonziniconsidered to provide high security. The password can be fairly easily
36324b2298SPaolo Bonzinibrute-forced by a client making repeat connections. For this reason, a
37324b2298SPaolo BonziniVNC server using password authentication should be restricted to only
38324b2298SPaolo Bonzinilisten on the loopback interface or UNIX domain sockets. Password
39324b2298SPaolo Bonziniauthentication is not supported when operating in FIPS 140-2 compliance
40324b2298SPaolo Bonzinimode as it requires the use of the DES cipher. Password authentication
41324b2298SPaolo Bonziniis requested with the ``password`` option, and then once QEMU is running
42324b2298SPaolo Bonzinithe password is set with the monitor. Until the monitor is used to set
43324b2298SPaolo Bonzinithe password all clients will be rejected.
44324b2298SPaolo Bonzini
45324b2298SPaolo Bonzini.. parsed-literal::
46324b2298SPaolo Bonzini
47f3f8ce67SDaniel P. Berrangé   |qemu_system| [...OPTIONS...] -vnc :1,password=on -monitor stdio
48324b2298SPaolo Bonzini   (qemu) change vnc password
49324b2298SPaolo Bonzini   Password: ********
50324b2298SPaolo Bonzini   (qemu)
51324b2298SPaolo Bonzini
52324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate:
53324b2298SPaolo Bonzini
54324b2298SPaolo BonziniWith x509 certificates
55324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~
56324b2298SPaolo Bonzini
57324b2298SPaolo BonziniThe QEMU VNC server also implements the VeNCrypt extension allowing use
58324b2298SPaolo Bonziniof TLS for encryption of the session, and x509 certificates for
59324b2298SPaolo Bonziniauthentication. The use of x509 certificates is strongly recommended,
60324b2298SPaolo Bonzinibecause TLS on its own is susceptible to man-in-the-middle attacks.
61324b2298SPaolo BonziniBasic x509 certificate support provides a secure session, but no
62324b2298SPaolo Bonziniauthentication. This allows any client to connect, and provides an
63324b2298SPaolo Bonziniencrypted session.
64324b2298SPaolo Bonzini
65324b2298SPaolo Bonzini.. parsed-literal::
66324b2298SPaolo Bonzini
67324b2298SPaolo Bonzini   |qemu_system| [...OPTIONS...] \
684d7beeabSDaniel P. Berrangé     -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=off \
69324b2298SPaolo Bonzini     -vnc :1,tls-creds=tls0 -monitor stdio
70324b2298SPaolo Bonzini
71324b2298SPaolo BonziniIn the above example ``/etc/pki/qemu`` should contain at least three
72324b2298SPaolo Bonzinifiles, ``ca-cert.pem``, ``server-cert.pem`` and ``server-key.pem``.
73324b2298SPaolo BonziniUnprivileged users will want to use a private directory, for example
74324b2298SPaolo Bonzini``$HOME/.pki/qemu``. NB the ``server-key.pem`` file should be protected
75324b2298SPaolo Bonziniwith file mode 0600 to only be readable by the user owning it.
76324b2298SPaolo Bonzini
77324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate_005fverify:
78324b2298SPaolo Bonzini
79324b2298SPaolo BonziniWith x509 certificates and client verification
80324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
81324b2298SPaolo Bonzini
82324b2298SPaolo BonziniCertificates can also provide a means to authenticate the client
83324b2298SPaolo Bonziniconnecting. The server will request that the client provide a
84324b2298SPaolo Bonzinicertificate, which it will then validate against the CA certificate.
85324b2298SPaolo BonziniThis is a good choice if deploying in an environment with a private
86324b2298SPaolo Bonziniinternal certificate authority. It uses the same syntax as previously,
874d7beeabSDaniel P. Berrangébut with ``verify-peer`` set to ``on`` instead.
88324b2298SPaolo Bonzini
89324b2298SPaolo Bonzini.. parsed-literal::
90324b2298SPaolo Bonzini
91324b2298SPaolo Bonzini   |qemu_system| [...OPTIONS...] \
924d7beeabSDaniel P. Berrangé     -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=on \
93324b2298SPaolo Bonzini     -vnc :1,tls-creds=tls0 -monitor stdio
94324b2298SPaolo Bonzini
95324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate_005fpw:
96324b2298SPaolo Bonzini
97324b2298SPaolo BonziniWith x509 certificates, client verification and passwords
98324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99324b2298SPaolo Bonzini
100324b2298SPaolo BonziniFinally, the previous method can be combined with VNC password
101324b2298SPaolo Bonziniauthentication to provide two layers of authentication for clients.
102324b2298SPaolo Bonzini
103324b2298SPaolo Bonzini.. parsed-literal::
104324b2298SPaolo Bonzini
105324b2298SPaolo Bonzini   |qemu_system| [...OPTIONS...] \
1064d7beeabSDaniel P. Berrangé     -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=on \
107f3f8ce67SDaniel P. Berrangé     -vnc :1,tls-creds=tls0,password=on -monitor stdio
108324b2298SPaolo Bonzini   (qemu) change vnc password
109324b2298SPaolo Bonzini   Password: ********
110324b2298SPaolo Bonzini   (qemu)
111324b2298SPaolo Bonzini
112324b2298SPaolo Bonzini.. _vnc_005fsec_005fsasl:
113324b2298SPaolo Bonzini
114324b2298SPaolo BonziniWith SASL authentication
115324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~
116324b2298SPaolo Bonzini
117324b2298SPaolo BonziniThe SASL authentication method is a VNC extension, that provides an
118324b2298SPaolo Bonzinieasily extendable, pluggable authentication method. This allows for
119324b2298SPaolo Bonziniintegration with a wide range of authentication mechanisms, such as PAM,
120324b2298SPaolo BonziniGSSAPI/Kerberos, LDAP, SQL databases, one-time keys and more. The
121324b2298SPaolo Bonzinistrength of the authentication depends on the exact mechanism
122324b2298SPaolo Bonziniconfigured. If the chosen mechanism also provides a SSF layer, then it
123324b2298SPaolo Bonziniwill encrypt the datastream as well.
124324b2298SPaolo Bonzini
125324b2298SPaolo BonziniRefer to the later docs on how to choose the exact SASL mechanism used
126324b2298SPaolo Bonzinifor authentication, but assuming use of one supporting SSF, then QEMU
127324b2298SPaolo Bonzinican be launched with:
128324b2298SPaolo Bonzini
129324b2298SPaolo Bonzini.. parsed-literal::
130324b2298SPaolo Bonzini
131f3f8ce67SDaniel P. Berrangé   |qemu_system| [...OPTIONS...] -vnc :1,sasl=on -monitor stdio
132324b2298SPaolo Bonzini
133324b2298SPaolo Bonzini.. _vnc_005fsec_005fcertificate_005fsasl:
134324b2298SPaolo Bonzini
135324b2298SPaolo BonziniWith x509 certificates and SASL authentication
136324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
137324b2298SPaolo Bonzini
138324b2298SPaolo BonziniIf the desired SASL authentication mechanism does not supported SSF
139324b2298SPaolo Bonzinilayers, then it is strongly advised to run it in combination with TLS
140324b2298SPaolo Bonziniand x509 certificates. This provides securely encrypted data stream,
141324b2298SPaolo Bonziniavoiding risk of compromising of the security credentials. This can be
142324b2298SPaolo Bonzinienabled, by combining the 'sasl' option with the aforementioned TLS +
143324b2298SPaolo Bonzinix509 options:
144324b2298SPaolo Bonzini
145324b2298SPaolo Bonzini.. parsed-literal::
146324b2298SPaolo Bonzini
147324b2298SPaolo Bonzini   |qemu_system| [...OPTIONS...] \
1484d7beeabSDaniel P. Berrangé     -object tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=on \
149f3f8ce67SDaniel P. Berrangé     -vnc :1,tls-creds=tls0,sasl=on -monitor stdio
150324b2298SPaolo Bonzini
151324b2298SPaolo Bonzini.. _vnc_005fsetup_005fsasl:
152324b2298SPaolo Bonzini
153324b2298SPaolo BonziniConfiguring SASL mechanisms
154324b2298SPaolo Bonzini~~~~~~~~~~~~~~~~~~~~~~~~~~~
155324b2298SPaolo Bonzini
156324b2298SPaolo BonziniThe following documentation assumes use of the Cyrus SASL implementation
157324b2298SPaolo Bonzinion a Linux host, but the principles should apply to any other SASL
158324b2298SPaolo Bonziniimplementation or host. When SASL is enabled, the mechanism
159324b2298SPaolo Bonziniconfiguration will be loaded from system default SASL service config
160324b2298SPaolo Bonzini/etc/sasl2/qemu.conf. If running QEMU as an unprivileged user, an
161324b2298SPaolo Bonzinienvironment variable SASL_CONF_PATH can be used to make it search
162324b2298SPaolo Bonzinialternate locations for the service config file.
163324b2298SPaolo Bonzini
164324b2298SPaolo BonziniIf the TLS option is enabled for VNC, then it will provide session
165324b2298SPaolo Bonziniencryption, otherwise the SASL mechanism will have to provide
166324b2298SPaolo Bonziniencryption. In the latter case the list of possible plugins that can be
167324b2298SPaolo Bonziniused is drastically reduced. In fact only the GSSAPI SASL mechanism
168324b2298SPaolo Bonziniprovides an acceptable level of security by modern standards. Previous
169324b2298SPaolo Bonziniversions of QEMU referred to the DIGEST-MD5 mechanism, however, it has
170324b2298SPaolo Bonzinimultiple serious flaws described in detail in RFC 6331 and thus should
171*e2bf32dfSDaniel P. Berrangénever be used any more. The SCRAM-SHA-256 mechanism provides a simple
172324b2298SPaolo Bonziniusername/password auth facility similar to DIGEST-MD5, but does not
173324b2298SPaolo Bonzinisupport session encryption, so can only be used in combination with TLS.
174324b2298SPaolo Bonzini
175324b2298SPaolo BonziniWhen not using TLS the recommended configuration is
176324b2298SPaolo Bonzini
177324b2298SPaolo Bonzini::
178324b2298SPaolo Bonzini
179324b2298SPaolo Bonzini   mech_list: gssapi
180324b2298SPaolo Bonzini   keytab: /etc/qemu/krb5.tab
181324b2298SPaolo Bonzini
182324b2298SPaolo BonziniThis says to use the 'GSSAPI' mechanism with the Kerberos v5 protocol,
183324b2298SPaolo Bonziniwith the server principal stored in /etc/qemu/krb5.tab. For this to work
184324b2298SPaolo Bonzinithe administrator of your KDC must generate a Kerberos principal for the
185324b2298SPaolo Bonziniserver, with a name of 'qemu/somehost.example.com@EXAMPLE.COM' replacing
186324b2298SPaolo Bonzini'somehost.example.com' with the fully qualified host name of the machine
187324b2298SPaolo Bonzinirunning QEMU, and 'EXAMPLE.COM' with the Kerberos Realm.
188324b2298SPaolo Bonzini
189324b2298SPaolo BonziniWhen using TLS, if username+password authentication is desired, then a
190324b2298SPaolo Bonzinireasonable configuration is
191324b2298SPaolo Bonzini
192324b2298SPaolo Bonzini::
193324b2298SPaolo Bonzini
194*e2bf32dfSDaniel P. Berrangé   mech_list: scram-sha-256
195324b2298SPaolo Bonzini   sasldb_path: /etc/qemu/passwd.db
196324b2298SPaolo Bonzini
197324b2298SPaolo BonziniThe ``saslpasswd2`` program can be used to populate the ``passwd.db``
198*e2bf32dfSDaniel P. Berrangéfile with accounts. Note that the ``passwd.db`` file stores passwords
199*e2bf32dfSDaniel P. Berrangéin clear text.
200324b2298SPaolo Bonzini
201324b2298SPaolo BonziniOther SASL configurations will be left as an exercise for the reader.
202324b2298SPaolo BonziniNote that all mechanisms, except GSSAPI, should be combined with use of
203324b2298SPaolo BonziniTLS to ensure a secure data channel.
204